IP SWITCHES. 1. Receive INFLOWS DATA IN
|
|
- Elisabeth Dalton
- 5 years ago
- Views:
Transcription
1 IP SWITCHES 1. Receive INFLOWS
2 IP SWITCHES 1. Receive INFLOWS 2. BUFFER & Route
3 IP SWITCHES 1. Receive INFLOWS 2. BUFFER & Route 3. Transmit OUTFLOWS
4 IP SWITCHES 1. Receive INFLOWS 2. BUFFER & Route 3. Transmit OUTFLOWS TRAFFIC SHAPING AFFECTS HOW MUCH BUFFER AN IP SWITCH NEEDS
5 THE PRINCIPLE IS ANALOGOUS TO WATER FLOWING IN & OUT OF A BUCKET WATER IN ANALOGY WATER OUT
6 THE PRINCIPLE IS ANALOGOUS TO WATER FLOWING IN & OUT OF A BUCKET 1. Both have INFLOWS WATER IN WATER OUT
7 THE PRINCIPLE IS ANALOGOUS TO WATER FLOWING IN & OUT OF A BUCKET 1. Both have INFLOWS WATER IN 2. Both BUFFER WATER OUT
8 THE PRINCIPLE IS ANALOGOUS TO WATER FLOWING IN & OUT OF A BUCKET 1. Both have INFLOWS WATER IN 2. Both BUFFER 3. Both have OUTFLOWS WATER OUT
9 IN THIS ANALOGY UNIFORM PACKET SPACING (NARROW TRAFFIC SHAPE) Δt 1 EQUATES TO UNIFORM WATER FLOW PACKETS Δt 2 Δt 3 Δt 4 Δt 1 Δt 2 Δt 3 Δt 4
10 WITH THE WATER/BUCKET ANALOGY IF THE WATER FLOW IS UNIFORM UNIFORM WATER FLOW
11 WITH THE WATER/BUCKET ANALOGY IF THE WATER FLOW IS UNIFORM UNIFORM WATER FLOW AND WATER ENTERING = WATER EXITING
12 WITH THE WATER/BUCKET ANALOGY IF THE WATER FLOW IS UNIFORM UNIFORM WATER FLOW AND WATER ENTERING = WATER EXITING THE BUCKET NEVER OVERFLOWS
13 WITH AN IP SWITCH IF PACKET SPACING IS UNIFORM (TRAFFIC PROFILE IS VERY NARROW)
14 WITH AN IP SWITCH IF PACKET SPACING IS UNIFORM (TRAFFIC PROFILE IS VERY NARROW) AND DATA ENTERING = DATA EXITING
15 WITH AN IP SWITCH IF PACKET SPACING IS UNIFORM (TRAFFIC PROFILE IS VERY NARROW) AND DATA ENTERING = DATA EXITING SWITCH MEMORY NEVER OVERFLOWS
16 WITH THE WATER/BUCKET ANALOGY IF THE WATER FLOW IS BURSTY NON-UNIFORM WATER FLOW
17 WITH THE WATER/BUCKET ANALOGY IF THE WATER FLOW IS BURSTY AND NON-UNIFORM WATER FLOW AVERAGE WATER ENTERING = AVERAGE WATER EXITING
18 WITH THE WATER/BUCKET ANALOGY IF THE WATER FLOW IS BURSTY AND NON-UNIFORM WATER FLOW AVERAGE WATER ENTERING = AVERAGE WATER EXITING THEN WATER LEVEL VARIES AND IF THE BUCKET ISN T BIG ENOUGH
19 WITH THE WATER/BUCKET ANALOGY IF THE WATER FLOW IS BURSTY AND NON-UNIFORM WATER FLOW AVERAGE WATER ENTERING = AVERAGE WATER EXITING THEN WATER LEVEL VARIES AND IF THE BUCKET ISN T BIG ENOUGH THE BUCKET OVERFLOWS
20 WITH AN IP SWITCH IF PACKET FLOW IS BURSTY (TRAFFIC PROFILE IS WIDE)
21 WITH AN IP SWITCH IF PACKET FLOW IS BURSTY (TRAFFIC PROFILE IS WIDE) AVERAGE DATA ENTERING AND = AVERAGE DATA EXITING
22 WITH AN IP SWITCH IF PACKET FLOW IS BURSTY (TRAFFIC PROFILE IS WIDE) AVERAGE DATA ENTERING AND = AVERAGE DATA EXITING THEN BUFFER LEVEL VARIES AND IF THE SWITCH BUFFER ISN T BIG ENOUGH
23 WITH AN IP SWITCH DROPPED PACKETS IF PACKET FLOW IS BURSTY (TRAFFIC PROFILE IS WIDE) AVERAGE DATA ENTERING AND = AVERAGE DATA EXITING THEN BUFFER LEVEL VARIES AND IF THE SWITCH BUFFER ISN T BIG ENOUGH THE BUFFER OVERFLOWS
24 AS NON-UNIFORM WATER FLOWS REQUIRE A BIG ENOUGH BUCKET TO ACCOUNT FOR WATER LEVEL VARIATION CONCLUSION
25 CONCLUSION AS NON-UNIFORM WATER FLOWS REQUIRE A BIG ENOUGH BUCKET TO ACCOUNT FOR WATER LEVEL VARIATION NON-UNIFORM DATA FLOWS (WIDE TRAFFIC SHAPES) REQUIRE ENOUGH IP SWITCH BUFFER MEMORY TO ACCOUNT FOR DATA LEVEL VARIATION WITHIN THE SWITCH
26 CONCLUSION TAKEAWAYS SUCH DEEP BUFFER MEMORY SWITCHES ARE AVAILABLE AND CAN BE SPECIFIED WHEN USING SMPTE ST WIDE TRAFFIC SHAPING USING SMPTE ST NARROW TRAFFIC SHAPING MINIMIZES SWITCH MEMORY REQUIRED NON-UNIFORM DATA FLOWS (WIDE TRAFFIC SHAPES) REQUIRE ENOUGH IP SWITCH BUFFER MEMORY TO ACCOUNT FOR DATA LEVEL VARIATION WITHIN THE SWITCH
Traffic Access Control. Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011
Traffic Access Control Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011 Outlines Traffic Access Control Definition Traffic Shaping Traffic Policing The Leaky Bucket The Token
More informationWhy Shaping Traffic at the Sender is Important. By Chuck Meyer, CTO, Production December 2017
Why Shaping Traffic at the Sender is Important By Chuck Meyer, CTO, Production December 2017 It s human nature to want to utilize a resource or tool to its fullest capacity. So, it stands to reason that
More informationLecture 5: Performance Analysis I
CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview
More informationTELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)
TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors
More informationLecture Outline. Bag of Tricks
Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information
More informationCongestion Control Open Loop
Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental
More informationRouter s Queue Management
Router s Queue Management Manages sharing of (i) buffer space (ii) bandwidth Q1: Which packet to drop when queue is full? Q2: Which packet to send next? FIFO + Drop Tail Keep a single queue Answer to Q1:
More informationQuality of Service (QoS)
Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive
More informationLecture 22: Buffering & Scheduling. CSE 123: Computer Networks Alex C. Snoeren
Lecture 22: Buffering & Scheduling CSE 123: Computer Networks Alex C. Snoeren Lecture 23 Overview Buffer Management FIFO RED Traffic Policing/Scheduling 2 Key Router Challenges Buffer management: which
More informationIntServ and RSVP. Overview. IntServ Fundamentals. Tarik Cicic University of Oslo December 2001
IntServ and RSVP Tarik Cicic University of Oslo December 2001 Overview Integrated Services in the Internet (IntServ): motivation service classes Resource Reservation Protocol (RSVP): description of the
More informationQUALITY of SERVICE. Introduction
QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia
More informationKent State University
CS 4/54201 Computer Communication Network Kent State University Dept. of Computer Science www.mcs.kent.edu/~javed/class-net06f/ 1 A Course on Networking and Computer Communication LECT-11, S-2 Congestion
More informationWHITE PAPER. Latency & Jitter WHITE PAPER OVERVIEW
Latency & Jitter In Networking Performance Evaluation OVERVIEW Latency and jitter are two key measurement parameters when evaluating and benchmarking the performance of a network, system or device. Different
More informationMAE 3130: Fluid Mechanics Lecture 5: Fluid Kinematics Spring Dr. Jason Roney Mechanical and Aerospace Engineering
MAE 3130: Fluid Mechanics Lecture 5: Fluid Kinematics Spring 2003 Dr. Jason Roney Mechanical and Aerospace Engineering Outline Introduction Velocity Field Acceleration Field Control Volume and System Representation
More informationChapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION
Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter 6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION 6.1 Introduction Supporting Quality of Service
More informationCHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS
28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the
More informationComputer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 5: Network Layer (cont ) Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall, 2003. 2
More informationResource allocation in networks. Resource Allocation in Networks. Resource allocation
Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers
More informationSupporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)
Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing
More informationStateless Resource Sharing AND ATS
Stateless Resource Sharing AND ATS Putting together the Best of breads IEEE P802.1Qcr, 2016-09-14, York, UK Szilveszter Nádas, Balázs Varga (A), János Farkas Introduction SRS Overview and Presentation
More informationData and File Structures Chapter 11. Hashing
Data and File Structures Chapter 11 Hashing 1 Motivation Sequential Searching can be done in O(N) access time, meaning that the number of seeks grows in proportion to the size of the file. B-Trees improve
More informationCS519: Computer Networks. Lecture 5, Part 5: Mar 31, 2004 Queuing and QoS
: Computer Networks Lecture 5, Part 5: Mar 31, 2004 Queuing and QoS Ways to deal with congestion Host-centric versus router-centric Reservation-based versus feedback-based Window-based versus rate-based
More informationADVANCED COMPUTER NETWORKS
ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,
More informationThe Network Layer. Network Layer Design Objectives
1 next CITS3002 help3002 CITS3002 schedule The Network Layer The Data Link Layer had the responsibility of reliably transmitting frames across along a single wire (or wireless,...) link. The Network Layer's
More informationChapter 24 Congestion Control and Quality of Service Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control
More informationTor: The Second-Generation Onion Router. Roger Dingledine, Nick Mathewson, Paul Syverson
Tor: The Second-Generation Onion Router Roger Dingledine, Nick Mathewson, Paul Syverson Introduction Second Generation of Onion Routing Focus on deployability Perfect forward secrecy Separation of protocol
More informationANSYS AIM Tutorial Compressible Flow in a Nozzle
ANSYS AIM Tutorial Compressible Flow in a Nozzle Author(s): Sebastian Vecchi Created using ANSYS AIM 18.1 Problem Specification Pre-Analysis & Start Up Pre-Analysis Start-Up Geometry Import Geometry Mesh
More informationLinear Routing: Floodrouting. HEC-RAS Introduction. Brays Bayou. Uniform Open Channel Flow. v = 1 n R2/3. S S.I. units
Linear Routing: Floodrouting HEC-RAS Introduction Shirley Clark Penn State Harrisburg Robert Pitt University of Alabama April 26, 2004 Two (2) types of floodrouting of a hydrograph Linear Muskingum Reservoir
More informationModule 3: Hashing Lecture 9: Static and Dynamic Hashing. The Lecture Contains: Static hashing. Hashing. Dynamic hashing. Extendible hashing.
The Lecture Contains: Hashing Dynamic hashing Extendible hashing Insertion file:///c /Documents%20and%20Settings/iitkrana1/My%20Documents/Google%20Talk%20Received%20Files/ist_data/lecture9/9_1.htm[6/14/2012
More informationLecture 24: Scheduling and QoS
Lecture 24: Scheduling and QoS CSE 123: Computer Networks Alex C. Snoeren HW 4 due Wednesday Lecture 24 Overview Scheduling (Weighted) Fair Queuing Quality of Service basics Integrated Services Differentiated
More informationNetworking. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island
Networking Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Why is Networking Needed? To enhance many devices Cars communicating to reduce
More informationdifferent problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management
Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion
More informationKathie Nichols CoDel. present by Van Jacobson to the IETF-84 Transport Area Open Meeting 30 July 2012 Vancouver, Canada
Kathie Nichols CoDel present by Van Jacobson to the IETF-84 Transport Area Open Meeting 30 July 2012 Vancouver, Canada 2 3 Sender Receiver 4 Sender Receiver 5 Sender Receiver Queue forms at a bottleneck
More informationCEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008
CEN445 Network Protocols & Algorithms Network Layer Prepared by Dr. Mohammed Amer Arafah Summer 2008 1 Congestion Control Algorithms General Principles of Congestion Control Congestion Prevention Policies
More informationH3C S9500 QoS Technology White Paper
H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and
More informationUNIT IV TRANSPORT LAYER
Transport Layer UNIT IV TRANSPORT LAYER Congestion Control and Quality of Service Ref: Data Communication & Networking, 4 th edition, Forouzan IV-1 DATA TRAFFIC The main focus of congestion control and
More informationDistributed Collision Detection. Tom Chen Project Presentation: Comp522 School of Computer Science McGill University December 13, 2008
Distributed Collision Detection Tom Chen Project Presentation: Comp522 School of Computer Science McGill University December 13, 2008 Online Multiplayer Games Multiple stations connected through network
More informationOverview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services
Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling
More information"Filling up an old bath with holes in it, indeed. Who would be such a fool?" "A sum it is, girl," my father said. "A sum. A problem for the mind.
We were doing very well, up to the kind of sum when a bath is filling at the rate of so many gallons and two holes are letting the water out, and please to say how long it will take to fill the bath, when
More informationChapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP
Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY The transport
More informationPIE: A lightweight latency control to address the buffer problem issue
PIE: A lightweight latency control to address the buffer problem issue Rong Pan, Preethi Natarajan, Chiara Piglione, Mythili Prabhu, Fred Baker and Bill Ver Steeg November 5, 2012 1 The Problem of Buffer
More informationQuality of Service (QoS)
CEN445 Network Protocols and Algorithms Chapter 5 Network Layer 5.4 Quality of Service Dr. Mostafa Hassan Dahshan Department of Computer Engineering College of Computer and Information Sciences King Saud
More informationM2M GPRS Gateway Monitor
M2M GPRS Gateway Monitor User Manual Version 3.20.1 Infranet Technologies GmbH, Tempowerkring 19, 21079 Hamburg, Germany, Fon: +49 40 696 47 260, support@m2mcontrol.de * * * * THIS PAGE IS INTENTIONALLY
More informationNetwork Model for Delay-Sensitive Traffic
Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.
More informationConfiguring QoS. Finding Feature Information. Prerequisites for QoS
Finding Feature Information, page 1 Prerequisites for QoS, page 1 Restrictions for QoS, page 3 Information About QoS, page 4 How to Configure QoS, page 28 Monitoring Standard QoS, page 80 Configuration
More informationEECS 122: Introduction to Computer Networks Resource Management and QoS. Quality of Service (QoS)
EECS 122: Introduction to Computer Networks Resource Management and QoS Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
More informationLecture 17: Distributed Multimedia
06-06798 Distributed Systems Lecture 17: Distributed Multimedia Distributed Systems 1 Overview Characteristics of multimedia systems audio, video, etc delivery in real time, on time Quality of service
More informationRegulating Packet Flow on a Per-Interface Basis Using Generic Traffic Shaping
Regulating Packet Flow on a Per-Interface Basis Using Generic Traffic Shaping Packet flow on a network can be regulated using a traffic shaping mechanism. One such traffic shaping mechanism is a Cisco
More informationCSE 123b Communications Software
CSE 123b Communications Software Spring 2002 Lecture 10: Quality of Service Stefan Savage Today s class: Quality of Service What s wrong with Best Effort service? What kinds of service do applications
More informationImplementation of a leaky bucket module for simulations in NS-3
Implementation of a leaky bucket module for simulations in NS-3 P. Baltzis 2, C. Bouras 1,2, K. Stamos 1,2,3, G. Zaoudis 1,2 1 Computer Technology Institute and Press Diophantus Patra, Greece 2 Computer
More informationCSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service
CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have
More informationChapter 24 Congestion Control and Quality of Service 24.1
Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control
More informationUnit 2 Packet Switching Networks - II
Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source
More informationQoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior
Table of Contents QoS Configuration 1 Overview 1 Introduction to QoS 1 QoS Policy 1 Traffic Policing 2 Congestion Management 3 Line Rate 9 Configuring a QoS Policy 9 Configuration Task List 9 Configuring
More informationConfiguring QoS. Understanding QoS CHAPTER
29 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide
More informationOn Generalized Processor Sharing with Regulated Traffic for MPLS Traffic Engineering
On Generalized Processor Sharing with Regulated Traffic for MPLS Traffic Engineering Shivendra S. Panwar New York State Center for Advanced Technology in Telecommunications (CATT) Department of Electrical
More informationContents. QoS overview 1
Contents QoS overview 1 QoS service models 1 Best-effort service model 1 IntServ model 1 DiffServ model 1 QoS techniques overview 1 Deploying QoS in a network 2 QoS processing flow in a device 2 Configuring
More informationLecture 17 Multimedia Transport Subsystem (Part 3)
CS 414 Multimedia Systems Design Lecture 17 Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2010 Administrative MP2: deadline Monday, March 1, demos 5-7pm (sign up in class on Monday) HW1:
More informationWeek 7: Traffic Models and QoS
Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,
More informationLassonde School of Engineering Winter 2016 Term Course No: 4411 Database Management Systems
Lassonde School of Engineering Winter 2016 Term Course No: 4411 Database Management Systems Last Name: First Name: Student ID: 1. Exam is 2 hours long 2. Closed books/notes Problem 1 (6 points) Consider
More informationWireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) Fair Queueing
Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark Fair Queueing 2 Today Wireline Queue Drop Wireless Queue Drop 3 Types of Congestion Control Strategies
More informationTesting Minimum Inter Frame Gap (IFG)
Testing Minimum Inter Frame Gap (IFG) Rev 4 How to test the minimum IFG spacing. APPLICATION NOTE The Xena testers can verify traffic forwarding performance, protocol scalability and services delivering
More informationCSE 461 Quality of Service. David Wetherall
CSE 461 Quality of Service David Wetherall djw@cs.washington.edu QOS Focus: How to provide better than best effort Fair queueing Application Application needs Transport Traffic shaping Guarantees IntServ
More informationThe difference between TTC JT-Y1221 and ITU-T Y.1221
The difference between TTC JT-Y1221 and ITU-T Y.1221 Traffic control and congestion control in IP based networks (The English Edition) Version 1.0 Published on March 27, 2013 THE TELECOMMUNICATION TECHNOLOGY
More informationKanban & Making Your Production Scream
Kanban & Making Your Production Scream Presented by Clinton Keith Clinton Keith Takeaway Provide you with another set of tools for production Demonstrate how Kanban is being used successfully today in
More informationProven IP Network Services: from End-User to Router and vice versa
Proven IP Network Services: from End-User to Router and vice versa Gerald Eichler, Ralf Widera T-Systems Nova, Technologiezentrum Darmstadt Gerald.Eichler@t-systems.com, Ralf.Widera@t-systems.com Anne
More informationConnecting 1D and 2D Domains
Connecting 1D and 2D Domains XP Solutions has a long history of Providing original, high-performing software solutions Leading the industry in customer service and support Educating our customers to be
More informationCongestion control in TCP
Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed
More informationEE 122: Differentiated Services
What is the Problem? EE 122: Differentiated Services Ion Stoica Nov 18, 2002 Goal: provide support for wide variety of applications: - Interactive TV, IP telephony, on-line gamming (distributed simulations),
More informationChapter 5. The Network Layer
Chapter 5 The Network Layer Congestion Control Algorithms General Principles of Congestion Control Congestion Prevention Policies Congestion Control in Virtual-Circuit Subnets Congestion Control in Datagram
More informationMaelstrom: An Enterprise Continuity Protocol for Financial Datacenters
Maelstrom: An Enterprise Continuity Protocol for Financial Datacenters Mahesh Balakrishnan, Tudor Marian, Hakim Weatherspoon Cornell University, Ithaca, NY Datacenters Internet Services (90s) Websites,
More informationConfiguring QoS CHAPTER
CHAPTER 37 This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750-E or 3560-E switch. With QoS,
More informationTrace Traffic Integration into Model-Driven Simulations
Trace Traffic Integration into Model-Driven Simulations Sponsor: Sprint Kert Mezger David W. Petr Technical Report TISL-10230-10 Telecommunications and Information Sciences Laboratory Department of Electrical
More informationTopic 4b: QoS Principles. Chapter 9 Multimedia Networking. Computer Networking: A Top Down Approach
Topic 4b: QoS Principles Chapter 9 Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 9-1 Providing multiple classes of service thus far: making
More informationAdvanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler
Advanced Lab in Computer Communications Meeting 6 QoS Instructor: Tom Mahler Motivation Internet provides only single class of best-effort service. Some applications can be elastic. Tolerate delays and
More informationFrame Relay Network Performance
Lab 4 Frame Relay Network Performance Overview Frame Relay is a connection-oriented, unreliable technology based on virtual circuits. A virtual circuit must be set up between a source and destination before
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1
RATE CONTROL SCHEME IN DATA NETWORK Joy Eneh 1, Harris Orah 2 1 Department of Electrical and Electronic Engineering, Nnamdi Azikiwe University Awka, Anambra state, Nigeria. 2 Department of Electronic Engineering,
More informationQuestions about Asynchronous Traffic Shaping
Questions about Asynchronous Traffic Shaping Norman Finn Cisco Systems March 22, 2016 IEEE 802.1 interim, Budapest, Hungary, May 2016 cr-finn-async-questions-0316-v01.pdf 1 Reading the P802.1Qcr PAR, it
More informationAgenda. Background Connecting to model Running the model Viewing results Running what if scenarios
Agenda Background Connecting to model Running the model Viewing results Running what if scenarios Background Don Pedro Reservoir Temperature model Danish Hydraulic Institute (DHI) MIKE software 3 dimensional
More informationCommunication Fundamentals in Computer Networks
Lecture 5 Communication Fundamentals in Computer Networks M. Adnan Quaium Assistant Professor Department of Electrical and Electronic Engineering Ahsanullah University of Science and Technology Room 4A07
More informationYou submitted this homework on Sat 22 Mar :51 AM PDT. You got a score of 5.00 out of 5.00.
Feedback Homework 9 Help You submitted this homework on Sat 22 Mar 2014 5:51 AM PDT. You got a score of 5.00 out of 5.00. Question 1 Lecture 9-1 discussed the quality of service requirements for different
More informationGood Ideas So Far Computer Networking. Outline. Sequence Numbers (reminder) TCP flow control. Congestion sources and collapse
Good Ideas So Far 15-441 Computer Networking Lecture 17 TCP & Congestion Control Flow control Stop & wait Parallel stop & wait Sliding window Loss recovery Timeouts Acknowledgement-driven recovery (selective
More informationTesting at 100% load with line rate speed compensation
Testing at 100% load with line rate speed compensation Rev 4 How to compensate for small differences in line rates between the Xena tester and the DUT/NUT. APPLICATION NOTE The Xena testers can verify
More informationEEC-484/584 Computer Networks
EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion
More informationProf. B.S. Thandaveswara. The computation of a flood wave resulting from a dam break basically involves two
41.4 Routing The computation of a flood wave resulting from a dam break basically involves two problems, which may be considered jointly or seperately: 1. Determination of the outflow hydrograph from the
More informationETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control
ETSF05/ETSF10 Internet Protocols Performance & QoS Congestion Control Quality of Service (QoS) Maintaining a functioning network Meeting applications demands User s demands = QoE (Quality of Experience)
More informationScheduling Mechanisms for SpaceWire Networks
Scheduling Mechanisms for SpaceWire Networks Ilya Korobkov, Elena Podgornova, Dmitry Raszhivin, Valentin Olenev, Irina Lavrovskaya {ilya.korobkov, alena.podgornova, dmitry.raszhivin, valentin.olenev, irina.lavrovskaya}@guap.ru
More informationImplementing Buffer Utilization Histogram on Cisco Nexus 5600 and Nexus 6000 Switch Families
White Paper Implementing Buffer Utilization Histogram on Cisco Nexus 5600 and Nexus 6000 Switch Families White Paper January 2015 2015 Cisco and/or its affiliates. All rights reserved. This document is
More informationA REDUCED SERVICE-SET ARCHITECTURE FOR THE INTERNET
A REDUCED SERVICE-SET ARCHITECTURE FOR THE INTERNET Gunnar Karlsson KTH Teleinformatics Kista, Sweden Contents Background Network quality of service Background for our work A reduced service-set architecture
More informationCover sheet for Assignment 5
Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, LEC0101 Cover sheet for Assignment 5 Due Monday April 2, 10:00am. Complete this page and attach it to the
More informationcopyright IOActive, Inc. 2007, all rights reserved. Breakage Jason Larsen
copyright IOActive, Inc. 2007, all rights reserved. Breakage Jason Larsen Who am I? Currently work for IOActive Spent the last five years doing SCADA research I don t often get a chance to speak to security
More informationA Rant on Queues. Van Jacobson. July 26, MIT Lincoln Labs Lexington, MA
A Rant on Queues Van Jacobson July 26, 2006 MIT Lincoln Labs Lexington, MA Unlike the phone system, the Internet supports communication over paths with diverse, time varying, bandwidth. This means we often
More informationTutorial 8 : Congestion Control
Lund University ETSN01 Advanced Telecommunication Tutorial 8 : Congestion Control Author: Antonio Franco Emma Fitzgerald Tutor: Farnaz Moradi December 18, 2015 Contents I Before you start 3 II Exercises
More informationETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control
ETSF05/ETSF10 Internet Protocols Performance & QoS Congestion Control Quality of Service (QoS) Maintaining a functioning network Meeting applications demands User s demands = QoE (Quality of Experience)
More informationEECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson
EECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson 1.0 Introduction Distributed real-time process control, from a network communication view, involves
More informationUnderstanding the Variable Bit Rate Real Time (VBR rt) Service Category for ATM VCs
Understanding the Variable Bit Rate Real Time (VBR rt) Service Category for ATM VCs Document ID: 10414 Contents Introduction Prerequisites Requirements Components Used Conventions What is Variable Bit
More informationAdvanced Computer Networks Spring Set #1
Advanced Computer Networks Spring 2019- Set #1 Prof. Zygmunt J. Haas Computer Science Department The University of Texas at Dallas ECSS 4.405 Richardson, TX 75080 http://www.utdallas.edu/~haas/courses/acn
More informationSolutions for Assignment 5
Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks Solutions for Assignment 5 Question 1 Suppose packets can get dropped or arbitrarily delayed inside a packet
More informationDetServ: Network Models for Real-Time QoS Provisioning in SDN-based Industrial Environments
Chair of Communication Networks Departement of Electrical and Computer Engineering Technische University of Munich DetServ: Network Models for Real-Time QoS Provisioning in SDN-based Industrial Environments
More informationIV. PACKET SWITCH ARCHITECTURES
IV. PACKET SWITCH ARCHITECTURES (a) General Concept - as packet arrives at switch, destination (and possibly source) field in packet header is used as index into routing tables specifying next switch in
More information