Price-Sensitive Application Adaptation in Deadline-Based Networks

Size: px
Start display at page:

Download "Price-Sensitive Application Adaptation in Deadline-Based Networks"

Transcription

1 Price-Sensitive Application Adaptation in Deadline-Based Networks Xiao Huan Liu Department of Computer Science University of Manitoba Winnipeg, MB R3T 2N2, Canada Yanni Ellen Liu Department of Computer Science University of Manitoba Winnipeg, MB R3T 2N2, Canada Abstract In deadline-based networks, the delay performance experienced by real-time data transfer largely depends on traffic deadlines and the load level along the data transfer path. To ensure fairness among users and to aid in network load control, a delay pricing and charging scheme was developed for realtime delivery in deadline-based networks; users experiencing different delay performance are charged differently and the charge is higher when the load is heavier. In response to an earlier charge, a price-sensitive adaptive application with limited budget constraints may adjust its traffic accordingly by varying traffic deadline requirements or traffic load intensity. We study the effect of application adaptation in two real-time traffic scenarios: discrete real-time documents, and a mixture of on-line game and multimedia traffic. We show through simulation that the aforementioned pricing and charging scheme easily enables user adaptation, which in turn may significantly improve the network delay performance. I. INTRODUCTION Deadline-based network resource management [9] is a framework that has been developed to support real-time data delivery in packet-switched networks. In this framework, each application data unit (ADU) is given a delivery deadline by the sending application. It represents the time at which the ADU should be delivered at the receiver. Depending on the maximum packet size of the underlying network, an ADU may be segmented into multiple packets for transmission. The ADU deadlines are mapped to packet deadlines, which are carried by packets and used by routers for channel scheduling. Deadlinebased channel scheduling algorithm is used inside routers. It was shown that deadline-based scheduling achieves superior performance to FCFS (First-Come First-Served) with respect to the percentage of ADUs that are delivered on time [7]. In deadline-based networks, the delay performance observed by real-time data largely depends on the deadline that it carries. If one is free to specify ADU deadlines, a sender may try to gain an advantage by using arbitrarily tight deadlines. Besides deadline urgency, the delay performance in deadline-based networks is also affected by the load conditions along the ADU path. When the load is light, the delay performance is good. When the load is heavy, congestion may occur; the delay performance deteriorates. To prevent greedy users from specifying arbitrarily urgent deadlines and to aid in network load control, a novel delay pricing and charging scheme was developed [6]. In this scheme, a market-based approach from the field of microeconomics was taken. Each channel periodically computes a channel delay price based on the relation between the delay supply and the delay demand. The delay supply S is derived from the total time it takes to service all the packets in a price update interval. The delay demand D is derived from the deadlines carried by these packets. At the end of the update interval n, the channel delay price p for the update interval n + 1 is defined as: p n+1 = {p n + σ (D S)/S,0} +, where σ is an adjustment factor that can be used to trigger faster or slower responses of the channel price to the amount D S. With this scheme, the channel price is higher (i) when the deadline urgency is higher, and (ii) when the load is heavier. Given this pricing scheme, packets and ADUs are charged as follows. At each channel, upon each packet departure, the packet response time d r (which is defined as the sum of the queuing delay, the packet transmission time, and the channel propagation delay) at this channel is calculated. Let p be the current channel delay price. The packet delay charge g at this channel is defined as: g = p/d r. A new packet header field called accumulated charge is defined to keep track of the total delay charge incurred by this packet at all channels along its path. If a packet arrives at the receiver on-time, the value of this field is retrieved and is taken as the packet charge. If an ADU is delivered on-time, its ADU charge is the sum of all its packets charges. Late ADUs are not charged. In response to the charges assigned by the network to earlier transmissions, a price-sensitive adaptive application with limited budget constraints may adjust its traffic by varying its traffic deadline requirements or load intensity. In this paper, we first present an example user adaptation model for real-time traffic. We then use simulation to show that such adaptation, which is enabled by the aforementioned delay pricing and charging scheme, may significantly improve the on-time performance in deadline-based networks. II. PRICE-SENSITIVE APPLICATION ADAPTATION In a network that has a service pricing and charging scheme in place, users are usually price-sensitive; users may adapt their traffic in response to price changes. If users cannot afford their transmissions given the current price, they either lower their transmission quality requirements, lower their traffic, or

2 opt not to transmit. Conversely, if users have abundant budget, they may raise their transmission quality requirements to gain a better service or increase their traffic to accomplish more tasks. In what follows, we focus on applications that may adapt their traffic requirements. We first describe an example user adaptation model. Note that our goal is not to come up with an accurate or even a good user adaptation model, but rather to use a somewhat reasonable one to demonstrate the potential of application adaptation in network load control. In our example adaptation model, we assume that application adaptation is performed periodically at regular time intervals, called adaptation intervals. We assume that each user (or application) has a fixed amount of budget for every price update interval called interval budget. The ADU charges are made available to the senders via application-layer acknowledgments (ACKs), and each user records the total charge that is received in every price update interval. Each sender also records the number of on-time ADUs (N t ) based on ACKs and the number of ADUs sent (N) per adaptation interval. Denote each source/destination pair in a network as a traffic class. And denote a sequence of ADUs that belong to the same traffic class as a session, which may represent the traffic of a real-time application. We assume that each session specifies an expected level of ADU on-time rate, EptRate. When the value of N t /N is greater than EptRate, a session is regarded as receiving satisfactory delay performance in the previous interval. Otherwise, a session is deemed unsatisfied. We also define a threshold budget parameter β to quantify the ratio of interval charge and interval budget. Our adaptation model operates as follows. If a session s charge (IC s )in the previous interval is lower than β percent of the session s interval budget (IB s ) and the value of N t /N of the session in the previous interval is greater than the session s EptRate, which indicate that the session has abundant budget and received satisfactory delay performance, the session performs adaptation by increasing its service requirement. Conversely, if a session s charge in the previous interval is greater than the session s interval budget or the value of N t /N of the session in the previous interval is lower than the session s EptRate, which indicates that the session does not possess enough budget or the session received unsatisfactory delay performance, the session performs adaptation by decreasing its service requirements. If the charge is in between β percent and 100% of the interval budget and the value of N t /N of the session in the previous interval is at least the session s EptRate, no adaptation is carried out. The pseudo code for session adaptation is given as follows: FUNCTION (Session-Adaptation) IF (IC s > IB s ) OR ( Nt N < EptRate) Decrease the session s traffic requirement IF (IC s < β IB s ) AND ( Nt N > EptRate ) Increase the session s traffic requirement Based on the charge and delay performance received in the previous adaptation interval, we assume that a sender can adjust one or more of the following three attributes for its subsequent traffic: the ADU deadline urgency level, the ADU sending rate, and the ADU size. When the budget is lower than the charge received in the previous interval or when the delay performance in the previous interval is unsatisfactory, a user may lower its traffic requirements in terms of less urgent deadlines, a lower ADU sending rate, and smaller ADUs. When deadlines are less urgent, its priority in deadline-based scheduling would drop, the response time would increase, which results in a lower charge; when the ADUs are sent at a lower rate, fewer ADUs are sent every fixed time interval, thus a lower charge; when ADUs are smaller, the network load level can be reduced, the mismatch between the delay demand and the delay supply would decrease, which results in lower prices and lower charges. Conversely, when the budget is greater than the charge received in the previous interval and the delay performance in the previous interval is satisfactory, a user can raise the requirements of his/her traffic. The exact algorithms for increasing or decreasing service requirements are application-traffic specific. In the next section, as proof of concept, we study two types of application traffic. III. PERFORMANCE EVALUATION We use discrete event simulation to evaluate the on-time performance when with adaptation. In our evaluation, two types of application traffic are experimented: discrete real-time ADUs and a mixture of real-time on-line game traffic and continuous-media traffic. The former represents generic realtime traffic while the latter represents a more realistic traffic mix. We first describe the performance model. The case when there is no application adaptation serves as the benchmark scenario to be compared with. A. Performance Model We first describe our network model. The traffic model for the two traffic scenarios will be described in the following two subsections respectively. A 13-node network model is used in our experiments. Its topology is depicted in Fig. 1. The capacity of each channel is assumed to be 155 Mbit/second Fig Network model The number shown on each link is the distance in miles. It is used to determine the propagation delay. The propagation speed is assumed to be 120 miles/ms. Each scheduler employs the T/H channel scheduling algorithm [7]. Fixed routing is assumed. At each channel, a finite buffer is in place. Modern

3 routers usually have large buffer sizes that can accommodate between 100 and 200 ms worth of data with respect to link capacity [3]. In our simulation, the buffer size was assumed to be 3.1 Mbyte for each outgoing channel. This corresponds to 160 ms worth of data with respect to the link capacity. For simplicity, we assume that packets dropped due to buffer overflow and late packets are not re-transmitted. In our simulations, we assume that the user adaptation intervals coincide with the price update intervals. We also assume that no ACK is lost and the end-to-end delay of ACK packet is uniformly distributed on the range of [35, 85] ms. This range is selected based on the longest end-to-end propagation delay, which is about 32.8 ms in our network. B. Case I: Discrete Real-Time Document Traffic The first type of traffic that we evaluate consists of discrete real-time ADUs. We describe the traffic model, the adaptation algorithm, and the performance evaluation in turn. Without loss of generality, we assume that there is one session per traffic class in our network. Each session continuously generates ADUs during the entire simulation duration. The ADU deadlines are given by deadline = arrival time + (1 + expo(d))x, where x is the sum of the ADU end-toend propagation delay and the ADU end-to-end transmission delay, and expo(d) represents an exponentially distributed random variate with mean d. We call parameter d the deadline urgency parameter. The ADU interarrival time of each session is assumed to be exponentially distributed with mean I. The ADU size is the product of θ and a random variate z, in Kbytes. θ is a parameter whose value increases (or decreases) when service requirement is increased (or decreased) in application adaptation. z is generated from Uniform(0.5, 1.5) and Uniform(1.5, 500) with equal probability. Thus the following attributes are associated with each session and are adjusted in application adaptation: 1) deadline urgency parameter d, 2) mean ADU interarrival time I, and 3) ADU size parameter θ. In our experiments, when with adaptation, for all sessions, the initial value of d is set to 0.4, the minimum value of d is set to 0.2, and there is not an enforced upper bound on the value of d. All initial values of I are 0.08 seconds, which corresponds to an offered load level of 1.01 on the bottleneck when without adaptation. There is not an enforced upper bound and lower bound on the value of I. The initial value and the maximum value of θ are set to 1, there is not an enforced lower bound on the value of θ. The increase or decrease of service requirements is modeled as follows. Define an adaptation parameter α. Let the value of an attribute in the update interval n be v n. The value of the attribute in the update interval n + 1, v n+1 is calculated by v n+1 = v n (1 + α), or v n+1 = v n (1 α) (1) In Case I, α value of 0.4 is used. To evaluate the ADU on-time performance when with adaptation, four experiments are performed: one without adaptation, in the other three, the three attributes: d, I, and θ are adapted respectively. The price update interval and the adaptation interval are assumed to be 1 second long. The initial price at each channel is assumed to be zero. All sessions interval budget is assumed to be 1. Note that we do not associate the price or charge with any concrete monetary value and leave this choice to network operators. The threshold budget parameter β for all sessions is 80, and the expected on-time rate EptRate for all sessions is 0.9. The simulation run length is 150 seconds. We assume that each sender starts to perform adaptation at time 10 seconds. This is to make sure that users begin their adaptation after the router buffers are filled to some degree. We use the aggregated on-time ADU throughput (in ADUs/sec) as our performance metric. It is defined as the total number of on-time ADUs across all traffic classes in the network divided by the simulation time. The results from our simulation are shown in Table I. TABLE I PERFORMANCE WITHOUT AND WITH ADAPTATION (CASE I) Adaptation attribute ADU On-time throughput (ADUs/second) Without adaptation Adapting deadline d Adapting inter arr t I Adapting ADU size θ It can be observed that the performance can be improved with application adaptation. We also plot the price dynamics over time on the bottleneck when without and with adaptation in Fig. 2. We observe that the channel delay price on the bottleneck can be well controlled when with user adaptation, in contrast the price keeps increasing when without adaptation. price Without adaptation With adaptation on deadline With adaptation on mean ADU interarrival time With adaptation on ADU size Fig. 2. time(sec) Channel delay price, Case I C. Case II: A Mix of On-line Game and Multimedia Traffic The traffic scenario in Case I represents a generic type of traffic with ample space for traffic attribute adaptation. In more realistic traffic scenarios, each user may open multiple real-time applications together, and each real-time application may have its own traffic characteristics. In particular, some parameters may not be adapted or may only be adapted within a small range. For example, a video application sends video frames at a rate of 25 frames/second to the network, in this case each video frame can be considered an ADU, and arbitrarily increasing or decreasing the ADU sending rate may not be possible. In addition, if an application can no longer

4 adapt its traffic parameters, it may be wise to temporarily pause the session, later when network load drops, the stopped session may be resumed. In this section, we experiment with a more realistic traffic scenario in which both on-line game and multimedia traffic are involved. We first describe the traffic model used and the adaptation model assumed, experiments and results are reported afterwards. There are three types of session in the traffic mix: realtime interactive game, interactive multimedia, and streaming stored multimedia. For game sessions, we use the traffic model in [4]. In multiplayer interactive games, when players make moves, state update messages are sent from game clients to the game server, and then forwarded by the server to other affected game clients. Each state update message can be considered an ADU. The traffic model is slightly different between the game clients to game server traffic and the game server to game clients traffic. For simplicity, in this study, we only include the game clients to game server traffic in our traffic model. The ADU interarrival times are bimodal, half of which are 33 ms fixed, the other half are 50 ms fixed. The two values randomly alternate. The ADU sizes follow a normal distribution with mean of 72.3, and standard deviation of 7.0, in bytes. For the multimedia sessions, in our experiments, 10 video traces from [1] are used. A variety of videos are included, there are drama movies, action movies, cartoon movies, TV shows, sports, and office camera video. Each trace includes three trace files, corresponding to the low, medium, and high quality levels of the same video respectively. A lower quality trace normally has smaller frame sizes than a higher quality trace. We use Q to denote the quality level of a video; three values of Q: 1, 2, and 3, are used to represent the low, medium, and high qualities respectively. Each trace consists of ADU sizes of video frames, in bytes. These frames are captured at a rate of 25 frames/second. Therefore the ADU interarrival time for multimedia traffic is 0.04 second. Let end-to-end deadline D denote the time interval between ADU arrival at the network and its deadline. Given D, the frame deadline is D plus the arrival time. All frames in a session have the same value of D. For each session, the initial D=(1+expo(d))*x p, where x p is the end-to-end propagation delay. Differ from the method in Case I, we do not consider the transmission delay, this is because the ADU sizes are relatively small, the transmission delay is much smaller than the propagation delay and is ignored. Each session has a minimum value of D (mind) and a maximum value of D (maxd). The end-to-end deadline of a session s ADUs can only be adapted within the range from mind to maxd. mind uses a d value of 0.3. For game sessions and interactive sessions, the maxd is 0.2 seconds; for the streaming sessions, the maxd is 10 seconds. In our experiments, a session s initial D is its mind. For the game sessions, it is not reasonable to adapt ADU sizes and ADU interarrival times, thus only end-to-end deadline parameter D can be adapted. For the multimedia sessions, because the play-out process requires that the multimedia frames be played back at the rate of 25 frames/second, it is not reasonable to adapt ADU interarrival times, thus only end-toend deadlines and ADU sizes can be adapted. For ADU sizes, we assume that an application can adapt by using a frame from a higher or a lower quality traces of the same video, i.e., Q is either increased or decreasing by 1. For all session types, we adapt D using Eq.1. For multimedia sessions, D will be adapted first, if D has reached the maximum or minimum value, which indicate D cannot be adapted further, Q is adapted. If no attributes of the session can be adapted during the lowering of the service requirement, the session is stopped in our adaptation model. A user can send traffic across multiple traffic classes from the same source. Along each traffic class, a user may initiate multiple sessions. To simplify the simulation, there is only one user on each traffic class, and a user generates a number of sessions belonging to the same traffic class at the beginning of simulation. All sessions continuously transmit ADUs during the entire simulation run except being stopped by their user, this way sessions perform the adaptation during the entire simulation. Each user has an interval budget. A user s interval budget (IB u ) is the sum of all his/her sessions interval budgets. A user s charge (IC u ) in an adaptation interval is the sum of all his/her sessions charges in the adaptation interval. If IC u is less than β*ib u and the user has stopped sessions, the earliest stopped session is resumed. In addition, each ongoing session of this user performs adaptation. If IC u is greater than β*ib u (this includes the case when IC u is greater than IB u ), normal session adaptation described above is performed. The pseudo code for user adaptation is given below: FUNCTION (User-Adaptation) IB u = user.ib s, IC u = user.ic s ; IF (IC u < β IB u ) AND (has stopped sessions) Resume the earliest stopped session FOR all user s sessions Perform session adaptation Two experiments are carried out to evaluate the performance gain when with application adaptation. In the first experiment, the number of sessions of a user is uniformly distributed on [10, 30], and the offered load on the bottleneck is 0.98 without user adaptation. In the second experiment, the number of sessions of a user is uniformly distributed on [10, 40], and the offered load on the bottleneck in this case is 1.27 without user adaptation. With these two levels, we can observe the adaptation behavior when the network load is heavy and when the network is overloaded. In both experiments, among all sessions in the network, 10% of them are game sessions, 70% of them are interactive multimedia sessions, and 20% of them are streaming multimedia sessions. At the beginning of simulation, a multimedia session randomly chooses a video from the available 10 videos, there are 50% of multimedia sessions use trace files in high quality, there are 30% of multimedia sessions use trace files in medium quality, and there are 20% of multimedia sessions use trace files in low quality. Two values of EptRate: 0.7, 0.9, and two values of α: 0.4 and 0.8 are experimented. The values of interval budget,

5 adaptation and price update interval length, β, simulation run length are all same as the values in Case I. The results for the first experiment are shown in Table II. Results for the other experiment show similar trend. We report TABLE II WITHOUT AND WITH ADAPTATION, NO. OF SESSIONS: [10,30] Adapting attributes Aggregated ADU ontime rate Lowest ADU ontime rate of a user On-time ADU throughput Offered load on bottleneck Without adaptation 66.10% 14.09% (α=0.4) (EptRate=0.9) 86.48% 72.51% (α=0.8) (EptRate=0.9) 82.58% 63.50% (α=0.4) (EptRate=0.7) 78.39% 48.87% (α=0.8) (EptRate=0.7) 75.65% 48.84% both ADU on-time throughput and ADU on-time rate. The ADU on-time rate is defined as the fraction of total ADUs sent that are delivered on-time. We collect the aggregated ontime throughput and ADU on-time rate, which are across all traffic classes in the network. We also collect the ADU on-time rate per user. In addition, we include the results for the user that had the lowest ADU on-time rate when without and with adaptation. We also include the offered load which is obtained from measurement on the bottleneck to show the average level of network load. From the results, it can be observed that by way of application adaptation, both the aggregated on-time performance and individual users on-time performance can be significantly improved. In addition, we can observe that, smaller value of adaptation parameter α results in lower offered load and slightly better ADU on-time performance, and a higher value of EptRate results in a slightly lower level of offered load but much improved on-time performance. We also plot the price dynamics in this mixed traffic case, comparing the channel delay price on the bottleneck when price Without user adaptation With user adaptation (α=0.4 EptRate=0.9) With user adaptation (α=0.4 EptRate=0.7) time(sec) Fig. 3. Channel delay price, Case II, no. of sessions: [10,30]. without and with adaptation. The results for the first experiment is shown in Fig. 3. The graph for the other experiment is similar. It can be observed that the channel delay price can be well controlled when with user adaptation; in contrast, the price keeps increasing when without user adaptation. IV. RELATED WORK Price-sensitive application adaptation in packet networks has been studied previously. In [8], adaptation of bandwidth is performed by users to maximize utility when congestion pricing is in place. Differ from [8] and other work in the field where pricing and adaptation of bandwidth is concerned, we focus on traffic delay pricing and adaptation. This is made available by the deadline-based framework in which each packet carries its delay requirement. There is a large body of literature on network pricing serving goals such as maximizing revenue, achieving fairness, reducing congestion, thus improving transmission performance. Congestion condition is conveyed to end users by mechanisms such as the TCPlike congestion indication [2] and a congestion price. In the latter case, this price may be used in calculating the charge to users [8], which is the approach that we take, or it may only serves the purpose of congestion indication [5], which in turn affects network resource management strategies. Aspects of differences between our work and existing work include studies of single channel [2] versus of a general network environment; centralized resource management such as that at the access point in [5] versus distributed resource management in our work. Compared to long-lived flows [2], we also studied more realistic traffic scenarios. V. CONTRIBUTIONS We study the effect of application adaptation for two types of real-time traffic in deadline-based networks. Such application adaptation is enabled by a novel delay pricing and charging scheme developed for deadline-based networks. We assume that price-sensitive users with limited budget constraints will adapt their traffic requirements based on the charges and delay performance received earlier. We show through simulation that the delay performance of the entire network as well as each user can be significantly improved as the result of such adaptation. REFERENCES [1] [2] T. Basar and R. Srikant. Revenue-maximizing pricing and capacity expansion in a many-users regime. In Proc. of Infocom, [3] Internet end-to-end interest mailing list. Queue size of routers. [4] T. Lang, P. Branch, and G. Armitage. A synthetic traffic model for Quake3. In ACE 04: Proceedings of the 2004 ACM SIGCHI International Conference on Advances in computer entertainment technology, pages , New York, NY, USA, ACM Press. [5] R.R. Liao, R.H. Wouhaybi, and A.T. Campbell. Wireless incentive engineering. IEEE Journal on Selected Areas in Communications, 21(10), Dec [6] Y. E. Liu and X. H. Liu. A Delay Pricing Scheme for Real-Time Delivery in Deadline-Based Networks. In Proc. of the First Workshop on Internet and Network Economics (WINE), [7] Y. E. Liu and J. W. Wong. Deadline based channel scheduling. In Proc. of IEEE Globecom, pages , San Antonio, Texas, Nov [8] X. Wang and H. Schulzrinne. Incentive-compatible adaptation of internet real-time multimedia. IEEE JSAC, 23(2), Feb [9] J. W. Wong and Y. E. Liu. Deadline based network resource management. In Proc. of ICCCN, pages , 2000.

Deadline-Based Scheduling in Support of Real-Time Data Delivery

Deadline-Based Scheduling in Support of Real-Time Data Delivery Deadline-Based Scheduling in Support of Real-Time Data Delivery Yanni Ellen Liu Department of Computer Science University of Manitoba Winnipeg, Manitoba, Canada R3T 2N2 yliu@cs.umanitoba.ca Johnny W. Wong

More information

Fairness in Multi-Player Online Games on Deadline-Based Networks. Anh Le, Yanni Ellen Liu University of Manitoba (2006)

Fairness in Multi-Player Online Games on Deadline-Based Networks. Anh Le, Yanni Ellen Liu University of Manitoba (2006) Fairness in Multi-Player Online Games on Deadline-Based Networks Anh Le, Yanni Ellen Liu University of Manitoba (2006) CCNC 2007 Las Vegas, Nevada Anh Le (University of Waterloo) Fairness in MOGs on Deadline-Based

More information

An Efficient Dynamic Bandwidth Allocation Algorithm for Quality of Service Networks

An Efficient Dynamic Bandwidth Allocation Algorithm for Quality of Service Networks An Efficient Dynamic Bandwidth Allocation Algorithm for Quality of Service Networks J. Elias 1, F. Martignon 2, and A. Capone 3 1 University of Paris 6, LIP6 Laboratory, 8 rue du Capitaine Scott, 75015,

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup Chapter 4 Routers with Tiny Buffers: Experiments This chapter describes two sets of experiments with tiny buffers in networks: one in a testbed and the other in a real network over the Internet2 1 backbone.

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

Increase-Decrease Congestion Control for Real-time Streaming: Scalability

Increase-Decrease Congestion Control for Real-time Streaming: Scalability Increase-Decrease Congestion Control for Real-time Streaming: Scalability Dmitri Loguinov City University of New York Hayder Radha Michigan State University 1 Motivation Current Internet video streaming

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK REVIEW ON CONGESTION CONTROL IN WIRELESS SENSOR NETWORK MR. HARSHAL D. WANKHADE,

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Improving VoD System Efficiency with Multicast and Caching

Improving VoD System Efficiency with Multicast and Caching Improving VoD System Efficiency with Multicast and Caching Jack Yiu-bun Lee Department of Information Engineering The Chinese University of Hong Kong Contents 1. Introduction 2. Previous Works 3. UVoD

More information

A QoS aware Packet Scheduling Scheme for WiMAX

A QoS aware Packet Scheduling Scheme for WiMAX A QoS aware Packet Scheduling Scheme for WiMAX Mahasweta Sarkar and Harpreet Sachdeva ABSTRACT WiMAX is one of the most promising broadband wireless technologies today. The WiMAX standard-802.16-is designed

More information

Application Layer Multicast Algorithm

Application Layer Multicast Algorithm Application Layer Multicast Algorithm Sergio Machado Universitat Politècnica de Catalunya Castelldefels Javier Ozón Universitat Politècnica de Catalunya Castelldefels Abstract This paper presents a multicast

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information

Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information Javad Ghaderi, Tianxiong Ji and R. Srikant Coordinated Science Laboratory and Department of Electrical and Computer Engineering

More information

FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC

FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC Kang G. Shin Real-time Computing Laboratory EECS Department The University of Michigan Ann Arbor, Michigan 48109 &in Zheng Mitsubishi

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS

ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS JUAN CARLOS ARAGON SUMMIT STANFORD UNIVERSITY TABLE OF CONTENTS 1.

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

2.993: Principles of Internet Computing Quiz 1. Network

2.993: Principles of Internet Computing Quiz 1. Network 2.993: Principles of Internet Computing Quiz 1 2 3:30 pm, March 18 Spring 1999 Host A Host B Network 1. TCP Flow Control Hosts A, at MIT, and B, at Stanford are communicating to each other via links connected

More information

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology Prashant Kumar Gupta M.Tech. Scholar, Computer Networks, Bhilai Institute of Technology, Durg (C.G.), India

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Chapter 6 Congestion Control and Resource Allocation

Chapter 6 Congestion Control and Resource Allocation Chapter 6 Congestion Control and Resource Allocation Overview of Congestion Control and Resource Allocation Problem: How to effectively and fairly allocate resources among a collection of competing users?

More information

On TCP friendliness of VOIP traffic

On TCP friendliness of VOIP traffic On TCP friendliness of VOIP traffic By Rashmi Parthasarathy WSU ID # 10975537 A report submitted in partial fulfillment of the requirements of CptS 555 Electrical Engineering and Computer Science Department

More information

Congestion-Aware Routing Protocol for Mobile Ad Hoc Networks

Congestion-Aware Routing Protocol for Mobile Ad Hoc Networks Congestion-Aware Routing Protocol for Mobile Ad Hoc Networks Xiaoqin Chen 1 Haley M. Jones 2 A.D.S. Jayalath 1 e-mail: {Sandra.Chen, Haley.Jones, Dhammika.Jayalath}@anu.edu.au 1 Department of Information

More information

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter 5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS 5.1 Introduction For successful

More information

Enemy Territory Traffic Analysis

Enemy Territory Traffic Analysis Enemy Territory Traffic Analysis Julie-Anne Bussiere *, Sebastian Zander Centre for Advanced Internet Architectures. Technical Report 00203A Swinburne University of Technology Melbourne, Australia julie-anne.bussiere@laposte.net,

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Call Admission Control in IP networks with QoS support

Call Admission Control in IP networks with QoS support Call Admission Control in IP networks with QoS support Susana Sargento, Rui Valadas and Edward Knightly Instituto de Telecomunicações, Universidade de Aveiro, P-3810 Aveiro, Portugal ECE Department, Rice

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Receiver-initiated Sending-rate Control based on Data Receive Rate for Ad Hoc Networks connected to Internet

Receiver-initiated Sending-rate Control based on Data Receive Rate for Ad Hoc Networks connected to Internet Receiver-initiated Sending-rate Control based on Data Receive Rate for Ad Hoc Networks connected to Internet Akihisa Kojima and Susumu Ishihara Graduate School of Engineering, Shizuoka University Graduate

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

Maximizing the Number of Users in an Interactive Video-on-Demand System

Maximizing the Number of Users in an Interactive Video-on-Demand System IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 4, DECEMBER 2002 281 Maximizing the Number of Users in an Interactive Video-on-Demand System Spiridon Bakiras, Member, IEEE and Victor O. K. Li, Fellow,

More information

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter 6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION 6.1 Introduction Supporting Quality of Service

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK I.J.E.M.S., VOL.2 (3) 211: 163-171 ISSN 2229-6X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION Jai Kumar and U.C. Jaiswal Department of Computer Science and Engineering, Madan

More information

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri

Department of Computer and IT Engineering University of Kurdistan. Transport Layer. By: Dr. Alireza Abdollahpouri Department of Computer and IT Engineering University of Kurdistan Transport Layer By: Dr. Alireza Abdollahpouri TCP/IP protocol suite 2 Transport Layer The transport layer is responsible for process-to-process

More information

70 CHAPTER 1 COMPUTER NETWORKS AND THE INTERNET

70 CHAPTER 1 COMPUTER NETWORKS AND THE INTERNET 70 CHAPTER 1 COMPUTER NETWORKS AND THE INTERNET one of these packets arrives to a packet switch, what information in the packet does the switch use to determine the link onto which the packet is forwarded?

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

MCS-377 Intra-term Exam 1 Serial #:

MCS-377 Intra-term Exam 1 Serial #: MCS-377 Intra-term Exam 1 Serial #: This exam is closed-book and mostly closed-notes. You may, however, use a single 8 1/2 by 11 sheet of paper with hand-written notes for reference. (Both sides of the

More information

STATE UNIVERSITY OF NEW YORK AT STONY BROOK. CEASTECHNICAL REPe. Multiclass Information Based Deflection Strategies for the Manhattan Street Network

STATE UNIVERSITY OF NEW YORK AT STONY BROOK. CEASTECHNICAL REPe. Multiclass Information Based Deflection Strategies for the Manhattan Street Network ; STATE UNIVERSITY OF NEW YORK AT STONY BROOK CEASTECHNICAL REPe Multiclass Information Based Deflection Strategies for the Manhattan Street Network J.-W. Jeng and T.G. Robertazzi June 19, 1992 Multiclass

More information

Chapter 6 Queuing Disciplines. Networking CS 3470, Section 1

Chapter 6 Queuing Disciplines. Networking CS 3470, Section 1 Chapter 6 Queuing Disciplines Networking CS 3470, Section 1 Flow control vs Congestion control Flow control involves preventing senders from overrunning the capacity of the receivers Congestion control

More information

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes

Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Impact of bandwidth-delay product and non-responsive flows on the performance of queue management schemes Zhili Zhao Dept. of Elec. Engg., 214 Zachry College Station, TX 77843-3128 A. L. Narasimha Reddy

More information

Variable Step Fluid Simulation for Communication Network

Variable Step Fluid Simulation for Communication Network Variable Step Fluid Simulation for Communication Network Hongjoong Kim 1 and Junsoo Lee 2 1 Korea University, Seoul, Korea, hongjoong@korea.ac.kr 2 Sookmyung Women s University, Seoul, Korea, jslee@sookmyung.ac.kr

More information

Congestion Control 3/16/09

Congestion Control 3/16/09 Congestion Control Outline Resource Allocation Queuing TCP Congestion Control Spring 009 CSE3064 Issues Two sides of the same coin pre-allocate resources so at to avoid congestion control congestion if

More information

CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF

CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF CS244 Advanced Topics in Computer Networks Midterm Exam Monday, May 2, 2016 OPEN BOOK, OPEN NOTES, INTERNET OFF Your Name: Answers SUNet ID: root @stanford.edu In accordance with both the letter and the

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP) TETCOS Transmission Control Protocol (TCP) Comparison of TCP Congestion Control Algorithms using NetSim @2017 Tetcos. This document is protected by copyright, all rights reserved Table of Contents 1. Abstract....

More information

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks

Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE j Networks Time Slot Assignment Algorithms for Reducing Upstream Latency in IEEE 802.16j Networks Shimpei Tanaka Graduate School of Information Science and Technology Osaka University, Japan sinpei-t@ist.osaka-u.ac.jp

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet

More information

NEW TRANSFER METHODS FOR CLIENT-SERVER TRAFFIC IN ATM NETWORKS

NEW TRANSFER METHODS FOR CLIENT-SERVER TRAFFIC IN ATM NETWORKS NEW TRANSFER METHODS FOR CLIENT-SERVER TRAFFIC IN ATM NETWORKS David Lecumberri Kai-Yeung Siu* Paolo Narv6ez Massachusetts Institute of Technology Masayoshi Nabeshima Naoaki Yamanaka NlT Network Service

More information

Cost-based Pricing for Multicast Streaming Services

Cost-based Pricing for Multicast Streaming Services Cost-based Pricing for Multicast Streaming Services Eiji TAKAHASHI, Takaaki OHARA, Takumi MIYOSHI,, and Yoshiaki TANAKA Global Information and Telecommunication Institute, Waseda Unviersity 29-7 Bldg.,

More information

15-744: Computer Networking. Overview. Queuing Disciplines. TCP & Routers. L-6 TCP & Routers

15-744: Computer Networking. Overview. Queuing Disciplines. TCP & Routers. L-6 TCP & Routers TCP & Routers 15-744: Computer Networking RED XCP Assigned reading [FJ93] Random Early Detection Gateways for Congestion Avoidance [KHR02] Congestion Control for High Bandwidth-Delay Product Networks L-6

More information

EP2210 Scheduling. Lecture material:

EP2210 Scheduling. Lecture material: EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom

More information

Considering Spurious Timeout in Proxy for Improving TCP Performance in Wireless Networks

Considering Spurious Timeout in Proxy for Improving TCP Performance in Wireless Networks Considering Spurious Timeout in Proxy for Improving TCP Performance in Wireless Networks YuChul Kim Telecommunication R&D Center, Samsung Electronics,Co., Ltd yuchul.kim@samsung.com DongHo Cho Communication

More information

Homework 1 50 points. Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below:

Homework 1 50 points. Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below: Homework 1 50 points Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below: A circuit-switching scenario in which Ncs users, each requiring a bandwidth

More information

A QoE Friendly Rate Adaptation Method for DASH

A QoE Friendly Rate Adaptation Method for DASH A QoE Friendly Rate Adaptation Method for DASH Yuming Cao 1,3, Xiaoquan You 2,3, Jia Wang 1,3, Li Song 1,3 1 Institute of Image Communication and Network Engineering, Shanghai Jiao Tong University 2 Communication

More information

Network-Adaptive Video Coding and Transmission

Network-Adaptive Video Coding and Transmission Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213

More information

Streaming Video and TCP-Friendly Congestion Control

Streaming Video and TCP-Friendly Congestion Control Streaming Video and TCP-Friendly Congestion Control Sugih Jamin Department of EECS University of Michigan jamin@eecs.umich.edu Joint work with: Zhiheng Wang (UofM), Sujata Banerjee (HP Labs) Video Application

More information

Absolute QoS Differentiation in Optical Burst-Switched Networks

Absolute QoS Differentiation in Optical Burst-Switched Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 1781 Absolute QoS Differentiation in Optical Burst-Switched Networks Qiong Zhang, Student Member, IEEE, Vinod M. Vokkarane,

More information

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research

CERIAS Tech Report A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research CERIAS Tech Report 2004-115 A Simulation Study on Multi-Rate Mobile Ad Hoc Networks by G Ding, X Wu, B Bhar Center for Education and Research Information Assurance and Security Purdue University, West

More information

The War Between Mice and Elephants

The War Between Mice and Elephants The War Between Mice and Elephants Liang Guo and Ibrahim Matta Computer Science Department Boston University 9th IEEE International Conference on Network Protocols (ICNP),, Riverside, CA, November 2001.

More information

Circuit Breakers for Multimedia Congestion Control

Circuit Breakers for Multimedia Congestion Control Circuit Breakers for Multimedia Congestion Control Varun Singh Aalto University Stephen McQuistin, Martin Ellis, and Colin Perkins University of Glasgow Context Video conferencing seeing increasing deployment

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Introduction: With the rapid growth of the Internet, customers are demanding multimedia applications such as telephony and video on demand, to be available

More information

CS 268: Computer Networking

CS 268: Computer Networking CS 268: Computer Networking L-6 Router Congestion Control TCP & Routers RED XCP Assigned reading [FJ93] Random Early Detection Gateways for Congestion Avoidance [KHR02] Congestion Control for High Bandwidth-Delay

More information

Design of Optical Burst Switches based on Dual Shuffle-exchange Network and Deflection Routing

Design of Optical Burst Switches based on Dual Shuffle-exchange Network and Deflection Routing Design of Optical Burst Switches based on Dual Shuffle-exchange Network and Deflection Routing Man-Ting Choy Department of Information Engineering, The Chinese University of Hong Kong mtchoy1@ie.cuhk.edu.hk

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic *

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * Joe Rogers and Kenneth J. Christensen Department of Computer Science and Engineering University of South Florida Tampa, Florida 33620

More information

ACLASS of users that has drawn much attention over the

ACLASS of users that has drawn much attention over the 296 IEEE TRANSACTIONS ON BROADCASTING, VOL. 56, NO. 3, SEPTEMBER 2010 Statistical Multiplexing of Upstream Transmissions in DOCSIS Cable Networks César Heyaime-Duvergé and Vasant K. Prabhu, Life Fellow,

More information

arxiv: v2 [cs.ni] 23 May 2016

arxiv: v2 [cs.ni] 23 May 2016 Simulation Results of User Behavior-Aware Scheduling Based on Time-Frequency Resource Conversion Hangguan Shan, Yani Zhang, Weihua Zhuang 2, Aiping Huang, and Zhaoyang Zhang College of Information Science

More information

Multimedia Systems 2011/2012

Multimedia Systems 2011/2012 Multimedia Systems 2011/2012 System Architecture Prof. Dr. Paul Müller University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY http://www.icsy.de Sitemap 2 Hardware

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

TFRC and RTT Thresholds Interdependence in a Selective Retransmission Scheme

TFRC and RTT Thresholds Interdependence in a Selective Retransmission Scheme TFRC and RTT s Interdependence in a Selective Retransmission Scheme Árpád Huszák, Sándor Imre Budapest University of Technology and Economics, Department of Telecommunications Budapest, Hungary Email:

More information

Class Based Congestion Control method for Wireless Sensor Networks

Class Based Congestion Control method for Wireless Sensor Networks 1 Class Based Congestion Control method for Wireless Sensor Networks Abbas Ali Rezaee Ph.D Student, CE Department, Science and Research Branch,Islamic Azad University (IAU), Tehran, Iran. aa.rezaee@srbiau.ac.ir

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

MEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS

MEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS MEASURING PERFORMANCE OF VARIANTS OF TCP CONGESTION CONTROL PROTOCOLS Harjinder Kaur CSE, GZSCCET, Dabwali Road, Bathinda, Punjab, India, sidhuharryab@gmail.com Gurpreet Singh Abstract CSE, GZSCCET, Dabwali

More information

Computer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am

Computer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am 15-744 Computer Networks Spring 2017 Homework 2 Due by 3/2/2017, 10:30am (please submit through e-mail to zhuoc@cs.cmu.edu and srini@cs.cmu.edu) Name: A Congestion Control 1. At time t, a TCP connection

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2015 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2015 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Lecture 24: Scheduling and QoS

Lecture 24: Scheduling and QoS Lecture 24: Scheduling and QoS CSE 123: Computer Networks Alex C. Snoeren HW 4 due Wednesday Lecture 24 Overview Scheduling (Weighted) Fair Queuing Quality of Service basics Integrated Services Differentiated

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

An Adaptive Neuron AQM for a Stable Internet

An Adaptive Neuron AQM for a Stable Internet An Adaptive Neuron AQM for a Stable Internet Jinsheng Sun and Moshe Zukerman The ARC Special Research Centre for Ultra-Broadband Information Networks, Department of Electrical and Electronic Engineering,

More information

Congestion control in TCP

Congestion control in TCP Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed

More information

Multimedia Networking

Multimedia Networking CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose

More information

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014

Congestion Control In The Internet Part 2: How it is implemented in TCP. JY Le Boudec 2014 1 Congestion Control In The Internet Part 2: How it is implemented in TCP JY Le Boudec 2014 Contents 1. Congestion control in TCP 2. The fairness of TCP 3. The loss throughput formula 4. Explicit Congestion

More information

An Enhanced Slow-Start Mechanism for TCP Vegas

An Enhanced Slow-Start Mechanism for TCP Vegas An Enhanced Slow-Start Mechanism for TCP Vegas Cheng-Yuan Ho a, Yi-Cheng Chan b, and Yaw-Chung Chen a a Department of Computer Science and Information Engineering National Chiao Tung University b Department

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information