A SIMULATION STUDY OF THE IMPACT OF SWITCHING SYSTEMS ON SELF-SIMILAR PROPERTIES OF TRAFFIC. Yunkai Zhou and Harish Sethu
|
|
- Hollie Green
- 5 years ago
- Views:
Transcription
1 Proceedings of the IEEE Workshop on Statistical Signal and Array Processing Pocono Manor, Pennsylvania, USA, August 14 16, 2000 A SIMULATION STUDY OF THE IMPACT OF SWITCHING SYSTEMS ON SELF-SIMILAR PROPERTIES OF TRAFFIC Yunkai Zhou and Harish Sethu Department of ECE, Drexel University 3141 Chestnut Street Philadelphia, PA {kenty, sethu}@ece.drexel.edu ABSTRACT Recent research has shown that traffic in Ethernet and other networks tends to exhibit properties of self-similarity such as long-range dependence and a high degree of correlation between arrivals. This paper investigates the impact of the switching network on the self-similar properties of the traffic. This simulation study reveals that switching networks tend to reduce the self-similarity of highly self-similar traffic. This is because of the truncation of long bursts due to packet discards, and also because of aggregation of flows through concatenated rather than superposed bursts. On the other hand, switching systems have the opposite effect of increasing the self-similarity of input traffic that has no selfsimilar properties such as traffic with Poisson or uniformly random distributions. This paper also presents simulationbased evidence of the causes behind these phenomena. 1. INTRODUCTION Recent work by many researchers has shown that traffic in Ethernet and other networks tends to be bursty at many or all time-scales [2,6], and that this phenomenon can be mathematically described using the notion of self-similarity. Extensive research has been done on the impact of the selfsimilar properties of traffic on network design issues, such as queueing performance [10], switch performance [3], congestion control [5] and scheduling algorithms [4]. While it is clear that traffic characteristics have an impact on network design issues, it is also true that the properties of a network have an impact on the characteristics of the traffic as it progresses through the network. Very few studies, however, have addressed this issue of changes in traffic characteristics caused by the network [1, 8, 12, 14]. These studies have focused on only the impact of individual components of a network such as the traffic shaper [12], the packet scheduler [1, 14] or a single-server queue [8], as opposed This work was supported in part by U.S. Air Force Contract F to the impact of the entire network as a whole. In addition, studies such as [8] have obtained insightful theoretical results which, however, cannot be readily applied to realistic network environments to solve problems in network engineering. Further, studies such as in [12, 14] only consider short-range burstiness, which does not capture all of the features of self-similar traffic, especially long-range burstiness as observed in [2, 6]. This paper presents a simulation study of the impact of a switching network on the self-similar properties of the traffic, and investigates the causes underlying the observed phenomena. We use self-similar traffic generated using the fractional ARIMA model [7], and a baseline Banyan topology for the switching network. Section 2 discusses the network and the traffic model in greater detail. Our simulation study reveals that switching networks tend to reduce the self-similarity of highly self-similar traffic. This is because of the truncation of long bursts due to packet discards, and also because of the aggregation of flows through concatenated rather than superposed bursts. On the other hand, switching systems also increase the selfsimilarity of input traffic that has no self-similar properties such as traffic with Poisson or uniformly random distributions. Section 3 presents these simulation results and the related analysis with simulation-based evidence of the causes behind the phenomena that yield these results. This section also explains our results in relation to those obtained in [8] and [11]. Section 4 concludes the paper. 2. NETWORK AND TRAFFIC MODEL 2.1. Network Model This study uses an N N baseline Banyan multistage network, with N source nodes and N destination nodes. The switching network consists of log m N stages of m m switching elements. In Banyan topologies, the path between a source end-point and a destination end-point is unique. This property of Banyan networks helps our study of the
2 Inlet 0 Inlet 15 Outlet 0 Outlet 15 Figure 1: Banyan network with N = 16 and m = 4. impact of switching systems, since it eliminates other secondary effects such as due to the choice of a routing algorithm. The popularity of Banyan topologies in real implementations is an additional motivation behind our use of this network model. Figure 1 shows a baseline Banyan network topology with N = 16 and m = 4. Each source node consists of N traffic generators, each of which generates traffic intended for a distinct destination node. Thus, the system consists of a total of N 2 traffic generators. In our simulations, traffic generators are all independent, and generate no more than one packet per cycle. We assume that packet lengths are constant, and that exactly one packet can be transmitted during each cycle across any port. If more than one packet are created in a source node during the same cycle, only one of these is allowed to be transmitted while all the others are buffered in a queue. We assume that the queue sizes at the source nodes are large enough that no packet is ever dropped before it enters the network. Destination nodes drain packets from the output ports of the last stage of switching elements, at the maximum rate of one packet per cycle. In the switching elements, each input port is associated with an input buffer of a fixed small capacity of 4 packet lengths. Each output port contains a dedicated output buffer. In addition, our simulations also use a shared output buffer of capacity equivalent to 4 packets per output port for additional space for the output queues. Under most traffic conditions, the shared buffer improves performance through better buffer utilization. During each cycle in our simulations, switching elements can accept no more than one packet at each input port into the input queue. Each non-empty output queue transmits exactly one packet to the output port in each cycle. We use the round-robin scheduling algorithm to transfer packets to and from the shared queue. A packet arriving at an input port first enters the associated input buffer, then the shared output buffer, and finally the output buffer corresponding to the destination port. Our model ensures that the maximum bandwidth with which the shared buffer can be written into or read from, is equal to the maximum aggregate input or output bandwidth of the switch. Packets arriving at a full input buffer are dropped. No packets, however, are dropped at any other point within the switching element, i.e., packets are forwarded to the shared buffer, or to an output buffer only if there is room available Traffic Model We use the fractional autoregressive integrated moving average (FARIMA) model [7] to synthesize self-similar traffic. FARIMA(p, d, q) is defined as Φ(B)X n = Θ(B) d ɛ n, where B is the backward operator, i.e., Bx n = x n 1. The definition above can be also expressed as X i = d ɛ i θ 1 d ɛ i 1 θ q d ɛ i q +φ 1 X i φ p X i p. (1) In equation (1), d is defined as d = i=0 b i( d)b i, where b 0 ( d) = 1 and b i ( d) = Γ(i + d), i = 1, 2,... Γ(d)Γ(i + 1) When the innovation ɛ i is a stable process with index α, i.e., ɛ i S α (σ, β, µ), the Hurst parameter, H, and the quantities α and d are related by d = H 1/α. In this paper, we use the Hurst parameter as the measure of the degree of self-similarity. The Hurst parameter has a range of 0.5 H 1, and a larger value of H implies a higher degree of self-similarity. Throughout our work, we use α = 1.2, σ = 1, β = 0, µ = 0, p = 50, and q = 400. Θ(B) is generated by selecting θ i in [0, 0.05] randomly and independently. Unlike Θ(B), Φ(B) is generated by selecting p/2 complex roots and their conjugates, since X i converges only if all roots of Φ(B) are in the unit circle. The real and imaginary components of each root are uniform in [0, 0.05]. Finally, we normalize X i to a series of 1 s or 0 s indicating whether or not a packet is generated during a given cycle. The variance-time plot [9] is used to estimate the Hurst parameter of observed network traffic. For a self-similar time series X(k), X m (k) is defined as and X m (k) = 1 m (m+1)k 1 i=mk varx m = varx/m β, X(i), where H = 1 β/2. Taking the logarithm of the equation above, we get, log varx m = β log m + log varx, From the above equation, the Hurst parameter is determined by the slope of the plot of log varx m vs. log m.
3 Hurst Parameter self similar traffic random traffic Number of Bursts (a) Input Traffic Number of Hops Traversed Figure 2: Per-hop changes in self-similarity. 3. SIMULATION RESULTS AND ANALYSIS In a switching element with buffers, a flow typically consumes more space during a bursty period. Under such conditions, depending on the buffer sharing policy and the buffer sizes, either other flows suffer from less empty space, or the bursty flow suffers a higher packet loss rate. In either of these cases, the traffic characteristics change due to delays or losses or both. If two or more flows are bursty at the same time, these effects are further magnified. This section presents our study of these effects on the self-similar properties of traffic. Our study includes two kinds of traffic sources, selfsimilar and uniform random traffic. A uniform random traffic source generates a packet during each cycle with a certain probability p, with uniformly distributed packet destinations. Like Poisson traffic, uniform random traffic has a Hurst parameter of 0.5, indicating that it has no self-similar properties. Our simulation study shows that the impact of a switching system on the self-similarity of the traffic depends on the self-similarity of the input traffic itself. A switching system reduces the self-similarity of highly self-similar traffic, while it increases that of non-self-similar traffic such as uniform random traffic. Figure 2 illustrates this phenomenon of the opposite nature of the effects observed depending on the self-similarity of the input traffic itself. When the traffic is uniformly random, the Hurst parameter increases from 0.5 to 0.64 after the first stage and stays around 0.65 thereafter. When the input traffic has a high level of self-similarity, the Hurst parameter drops from 0.86 to 0.78 after the first stage, and further to 0.76 after the second stage. This interesting phenomenon shows us that, switching networks have the effect of shaping the traffic characteristics to a moderate level of self-similarity. In the following, we investigate Number of Bursts Burst Length (b) Output Traffic Burst Length Figure 3: Distribution of short burst length, (a) input traffic and (b) output traffic. and present simulation-based evidence of the causes of this phenomenon. In the case of uniform random traffic, the probability of packet arrivals during each cycle is independent of the packet arrival pattern during the previous cycles. As the traffic progresses through a switching network with buffers in the switching elements, this independence assumption progressively becomes less valid. Packets for the same output port that independently arrive at different times, due to congestion, end up waiting in the buffers for transmission, and get transmitted in a burst at the output port. This phenomenon adds burstiness to the traffic at each new hop in the path of the traffic, changing the output traffic characteristics to something other than random uniform traffic. Packet arrivals at subsequent hops of the network are now correlated, as reflected in the increased Hurst parameter of the traffic. The distribution of burst lengths in highly self-similar traffic is heavy-tailed, i.e., the probability distribution is given by P [X > x] x α. Such a distribution decays
4 Number H (Input H (Output Percentage of Nodes Traffic) Traffic) Decrease % % % Table 1: Self-similarity of traffic vs. number of nodes. Hurst Parameter m=16 m=4 m=2 more slowly than exponentially, causing a high likelihood of long bursts in self-similar traffic. However, because of congestion and limited buffering capacities in the switching elements, long bursts do not easily survive in switching networks. In fact, long bursts self-destruct through causing congestion, triggering discarding of packets and thus breaking the long burst into smaller ones. For example, in our simulations, the longest burst observed at the traffic source had more than 6,000 consecutive packets, while the output traffic had no bursts longer than 900 packets. This is also illustrated in Figure 3, which shows that the distribution of short burst lengths of the input and the output traffic of the network. The output traffic has a larger percentage of shorter bursts, and with a significantly smaller average burst length. Note that the relative increase in shorter bursts increases the value of the index α in a heavy-tailed distribution given by P [X > x] x α. This, in turn, has the effect of reducing the Hurst parameter since, as shown in [13], H = (3 α)/2. In addition to the reduction in burst lengths, the other reason for this phenomenon is that aggregation of flows in networks typically has the effect of reducing variation over larger scales. It should be understood that this phenomenon is quite different from that shown in [11]. Willinger et al. show that a superposition of many ON/OFF traffic sources exhibits properties of self-similarity when the lengths of the ON and OFF periods are independent and follow a heavytailed distribution. Because of the limited bandwidth of output links, a true superposition is never possible in switching networks. Bursts are actually concatenated rather than superposed on top of each other on the output links. A superposition increases variation across scales, but a concatenation actually has the effect of spreading out the peaks and thus smoothening out the variations. The phenomenon discussed above can be verified through simulation using a single m m switching element and varying m. In this model, each output link is fed by m selfsimilar traffic sources at the inputs. Table 1 shows the impact on the self-similarity of the output traffic for different values of m. As can be observed from Table 1, the selfsimilarity of traffic decreases as the level of aggregation increases. This reduction in the self-similarity of traffic with aggregation, is also the reason that highly self-similar traffic Stage Number Figure 4: Per-hop changes for different switch sizes. reduces in self-similarity as it progresses through each hop in the switching network. This is easily understood from noting that the output links further hops away from the traffic sources carry more of an aggregated traffic than the ones closer to the sources. The same phenomenon is apparent in the impact of the size of switching elements used in the topology of a switching network. A network designed using 2 2 switching elements, as compared to 4 4 switching elements, will contribute to a smaller decrease in the observed Hurst parameter after the first hop. A network with 4 4 switching elements achieves the same level of aggregation in fewer hops than one using 2 2 switching elements. Figure 4 shows the perhop changes in the self-similarity of traffic for switching networks with different sizes of switching elements. It is worthwhile to discuss our results in relation to those obtained by Song et al. [8] in their study of self-similarity of output traffic at a single server with an infinite buffer. It is proved in [8] that if the queue length has finite variance, the self-similar properties of input and output traffic remain the same. In fact, it is shown that both the input and output traffic have the same Hurst parameter. Noting that it is unrealistic to assume an infinite buffer, the authors in [8] argue that in real switches, the condition that queue length has finite variance is always satisfied. However, another important impact of finite buffers should be considered traffic can be accepted into the buffer only if there is available space. In the absence of a feedback mechanism, packet discarding becomes inevitable which changes the traffic characteristics; in the presence of a feedback mechanism such as credit-based flow control, the characteristics of arriving traffic itself changes. A second important reason for the apparent discrepancy between our results and that in [8] is that our results use the self-similar properties of aggregate traffic at each output link, while the results in [8] compare
5 the properties of individual flows before and after service by the server. Our approach to only analyze aggregate traffic is motivated by the fact that most switches and routers do not maintain per-flow queueing, and therefore, only the characteristics of the aggregate traffic at each input or output link is important to the performance and related issues in the design of switches and routers. All of the results presented in this paper were obtained at moderate or heavy traffic loads. As one might expect, the impact of the switching network on the traffic characteristics is minimal when the traffic load is small. 4. CONCLUSION In this paper, we have presented simulation studies that show that highly self-similar input traffic reduces in its selfsimilarity as it progresses through a switching network. Our analysis indicates that this phenomenon is caused by the truncation of long bursts due to packet discarding, and by the aggregation of flows through concatenation of bursts. On the other hand, during periods of congestion in networks with buffers, input traffic with no self-similar properties increases in self-similarity as it progresses through the network. These results have important implications relevant to the design of routers and switches. For example, our results suggest that core Internet routers receive traffic that is much less self-similar than traffic that emerges out of border routers directly connected to Ethernet LANs. Acknowledgments The simulation code to generate the self-similar traffic was partly written by Haiguang Cheng. The authors would also like to gratefully acknowledge his contribution through discussions that further improved the traffic model. REFERENCES [1] S. Borst, O. Boxma and P. Jelenković. Asymptotic Behavior of Generalized Processor Sharing with Long-Tailed Traffic Sources. Proceedings of IEEE INFOCOMM, Tel Aviv, Israel, Mar [2] M. E. Crovella and A. Bestavros. Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes. IEEE/ACM Transactions on Networking, vol 5, no. 6, Dec [3] S. Fong and S. Singh. Performance Evaluation of Shared-Buffer ATM Switches Under Self-Similar Traffic. Proceedings of IEEE International Performance, Computing, and Communications Conference, Arizona, [4] R. G. Garroppo, S. Giordano, S. Miduri, M. Pagano and F. Russo. Statistical Multiplexing of Self-Similar VBR Video-conferencing Traffic. Proceedings of GLOBECOM, [5] A. Gersht, G. Pathak and A. Shulman. Burst Level Congestion Control in ATM Networks. Proceedings of IEEE Symposium on Computer and Communications, Athens, Greece, July [6] W. E. Leland, M. S. Taqqu, W. Willinger and D. V. Wilson. On the Self-Similar Nature of Ethernet Traffic (Extended Version). IEEE/ACM Transactions on Networking, vol. 2, no. 1, Feb [7] G. Samorodnitsky and M. S. Taqqu. Stable Non- Gaussian Random Processes: Stochastic Models with Infinite Variance. Chapman & Hall, NY, [8] S. Song, J. K.-Y. Ng and B. Tang. On the Self- Similarity Property of the Output Process from a Network Server with Self-Similar Input Traffic. Proceedings of Sixth International Conference on Real-Time Computing Systems and Applications, pp , Dec [9] W. Stallings. High-Speed Networks: TCP/IP and ATM Design Principles. Prentice Hall, Upper Saddle River, NJ [10] B. Tsybakov and N. D. Georganas. Overflow Probability in an ATM Queue with Self-Similar Input Traffic. Proceedings of IEEE International Conference on Communications, Montreal, Canada, June [11] W. Willinger, M. S. Taqqu, R. Sherman and D. V. Wilson. Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level. IEEE/ACM Transactions on Networking, vol.5, no.1, Feb [12] S. Wittevrongel and H. Bruneel. Output Traffic Analysis of a Leaky Bucket Traffic Shaper Fed by a Bursty Source. Proceedings of IEEE International Conference on Communications, pp , [13] X. Yang, A. P. Petropulu and V. Adams. The Extended ON/OFF Model for High-Speed Data Network. Workshop on Applications of Heavy Tailed Distributions in Economics, Engineering and Statistics, Washington, D.C., Jun [14] H. Zhang. Service Disciplines for Guaranteed Performance Service in Packet-Switching Networks. Proceedings of the IEEE, vol. 83, no. 10, Oct
Buffer Management for Self-Similar Network Traffic
Buffer Management for Self-Similar Network Traffic Faranz Amin Electrical Engineering and computer science Department Yazd University Yazd, Iran farnaz.amin@stu.yazd.ac.ir Kiarash Mizanian Electrical Engineering
More informationVirtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements
Proceedings of the Applied Telecommunication Symposium (part of Advanced Simulation Technologies Conference) Seattle, Washington, USA, April 22 26, 21 Virtual Circuit Blocking Probabilities in an ATM Banyan
More informationActive Queue Management for Self-Similar Network Traffic
Active Queue Management for Self-Similar Network Traffic Farnaz Amin*, Kiarash Mizanain**, and Ghasem Mirjalily*** * Electrical Engineering and computer science Department, Yazd University, farnaz.amin@stu.yazduni.ac.ir
More informationCharacterizing Internet Load as a Non-regular Multiplex of TCP Streams
Characterizing Internet Load as a Non-regular Multiplex of TCP Streams J. Aracil, D. Morató Dpto. Automática y Computación Universidad Pública de Navarra {javier.aracil,daniel.morato}@unavarra.es http://www.tlm.unavarra.es
More informationAdvanced Internet Technologies
Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/
More informationTHE TCP specification that specifies the first original
1 Median Filtering Simulation of Bursty Traffic Auc Fai Chan, John Leis Faculty of Engineering and Surveying University of Southern Queensland Toowoomba Queensland 4350 Abstract The estimation of Retransmission
More informationUnit 2 Packet Switching Networks - II
Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source
More informationSIMULATING CDPD NETWORKS USING OPNET
SIMULATING CDPD NETWORKS USING OPNET Michael Jiang, Stephen Hardy, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia Canada V5A 1S6 {zjiang, steve,
More informationPerformance Study of Routing Algorithms for LEO Satellite Constellations
Performance Study of Routing Algorithms for LEO Satellite Constellations Ioannis Gragopoulos, Evangelos Papapetrou, Fotini-Niovi Pavlidou Aristotle University of Thessaloniki, School of Engineering Dept.
More informationCongestion Propagation among Routers in the Internet
Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,
More informationMeasurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network
Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Qing (Kenny) Shao and Ljiljana Trajkovic {qshao, ljilja}@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl
More informationMulticast Transport Protocol Analysis: Self-Similar Sources *
Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,
More informationModelling data networks research summary and modelling tools
Modelling data networks research summary and modelling tools a 1, 3 1, 2 2, 2 b 0, 3 2, 3 u 1, 3 α 1, 6 c 0, 3 v 2, 2 β 1, 1 Richard G. Clegg (richard@richardclegg.org) December 2011 Available online at
More informationMeasurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network
Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Qing (Kenny) Shao and Ljiljana Trajkovic {qshao, ljilja}@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl
More informationA PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING
A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING Timothy D. Neame,l Moshe Zukerman 1 and Ronald G. Addie2 1 Department of Electrical and 2 Department of Mathematics Electronic Engineering, and Computer
More informationWhat Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control
Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit
More informationFB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network
Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu
More informationSIMULATION OF PACKET DATA NETWORKS USING OPNET
SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada
More informationOn the Impact of Burst Assembly on Self- Similarity at the Edge Router in Optical Burst Switched Networks
On the Impact of Burst Assembly on Self- Similarity at the Edge Router in Optical Burst Switched Networks Siamak Azodolmolky, Anna Tzanakaki, Ioannis Tomkos Athens Information Technology (AIT), P.O.Box
More informationSelf Similar Network Traffic present by Carl Minton. Definition of Self Similarity
Self Similar Network Traffic present by Carl Minton Agenda Definition of self similarity Quantifying self similarity Self similarity of network traffic Implications for network performance Pointers for
More informationPerformance Evaluation. of Input and Virtual Output Queuing on. Self-Similar Traffic
Page 1 of 11 CS 678 Topics in Internet Research Progress Report Performance Evaluation of Input and Virtual Output Queuing on Self-Similar Traffic Submitted to Zartash Afzal Uzmi By : Group # 3 Muhammad
More informationPerformance Analysis of Cell Switching Management Scheme in Wireless Packet Communications
Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical
More informationDynamics of Feedback-induced Packet Delay in Power-law Networks
Dynamics of Feedback-induced Packet Delay in Power-law Networks Takahiro Hirayama, Shin ichi Arakawa, Ken-ichi Arai, and Masayuki Murata Graduate School of Information Science and Technology Osaka University,
More informationINTERNET OVER DIGITAL VIDEO BROADCAST: PERFORMANCE ISSUES
INTERNET OVER DIGITAL VIDEO BROADCAST: PERFORMANCE ISSUES Hakan Yılmaz TÜBİTAK Marmara Research Center Information Technologies Research Institute Kocaeli, Turkey hy@btae.mam.gov.tr Bülent Sankur Boğaziçi
More informationAn Approach for Enhanced Performance of Packet Transmission over Packet Switched Network
ISSN (e): 2250 3005 Volume, 06 Issue, 04 April 2016 International Journal of Computational Engineering Research (IJCER) An Approach for Enhanced Performance of Packet Transmission over Packet Switched
More informationNetwork Model for Delay-Sensitive Traffic
Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.
More informationTraffic Modeling of Communication Networks
EÖTVÖS LORÁND UNIVERSITY, BUDAPEST Traffic Modeling of Communication Networks PÉTER VADERNA THESES OF PHD DISSERTATION Doctoral School: Physics Director: Prof. Zalán Horváth Doctoral Program: Statistical
More informationPerformance Study of Adaptive Routing Algorithms for LEO Satellite Constellations under Self-Similar and Poisson Traffic
Performance Study of Adaptive Routing Algorithms for LEO Satellite Constellations under Self-Similar and Poisson Traffic Ioannis Gragopoulos, Evangelos Papapetrou, Fotini-Niovi Pavlidou Aristotle University
More informationSIMULATION OF PACKET DATA NETWORKS USING OPNET
Nazy Alborz Maryam Keyvani Milan Nikolic Ljiljana Trajkovic SIMULATION OF PACKET DATA NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road
More informationSIMULATING CDPD NETWORKS USING OPNET
Michael Jiang Stephen Hardy Ljiljana Trajkovic SIMULATING CDPD NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road Map Introduction Simulation
More informationStream Sessions: Stochastic Analysis
Stream Sessions: Stochastic Analysis Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath and Dr. Kumar Outline Loose bounds
More informationPerformance of a Switched Ethernet: A Case Study
Performance of a Switched Ethernet: A Case Study M. Aboelaze A Elnaggar Dept. of Computer Science Dept of Electrical Engineering York University Sultan Qaboos University Toronto Ontario Alkhod 123 Canada
More informationCongestion Control in Communication Networks
Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below
More informationDesign and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture
Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture Robert D. allaway and Michael Devetsikiotis Department of Electrical
More informationLecture Outline. Bag of Tricks
Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information
More informationLong-Range Dependence of Internet Traffic Aggregates
Long-Range Dependence of Internet Traffic Aggregates Solange Lima, Magda Silva, Paulo Carvalho, Alexandre Santos, and Vasco Freitas Universidade do Minho, Departamento de Informatica, 4710-059 Braga, Portugal
More informationLoad Balancing with Minimal Flow Remapping for Network Processors
Load Balancing with Minimal Flow Remapping for Network Processors Imad Khazali and Anjali Agarwal Electrical and Computer Engineering Department Concordia University Montreal, Quebec, Canada Email: {ikhazali,
More informationAppendix A. Methodology
193 Appendix A Methodology In this appendix, I present additional details of the evaluation of Sync-TCP described in Chapter 4. In Section A.1, I discuss decisions made in the design of the network configuration.
More informationAn Enhanced Dynamic Packet Buffer Management
An Enhanced Dynamic Packet Buffer Management Vinod Rajan Cypress Southeast Design Center Cypress Semiconductor Cooperation vur@cypress.com Abstract A packet buffer for a protocol processor is a large shared
More informationA VERIFICATION OF SELECTED PROPERTIES OF TELECOMMUNICATION TRAFFIC GENERATED BY OPNET SIMULATOR.
UNIVERSITY OF LJUBLJANA Faculty of Electrical Engineering Daniel Alonso Martinez A VERIFICATION OF SELECTED PROPERTIES OF TELECOMMUNICATION TRAFFIC GENERATED BY OPNET SIMULATOR. Erasmus exchange project
More informationAnalysis of Random Access Protocol under Bursty Traffic
Analysis of Random Access Protocol under Bursty Traffic Jianbo Gao and Izhak Rubin Electrical Engineering Department, University of California, Los Angeles, CA 90095 {jbgao, rubin}@ee.ucla.edu Abstract.
More informationUtilizing Neural Networks to Reduce Packet Loss in Self-Similar Teletraffic Patterns
Utilizing Neural Networks to Reduce Packet Loss in Self-Similar Teletraffic Patterns Homayoun Yousefi zadeh; EECS Dept; UC, Irvine Edmond A. Jonckheere; EE-Systems Dept; USC John A. Silvester; EE-Systems
More informationPerformance Consequences of Partial RED Deployment
Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing
More informationWilliam Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing
William Stallings Data and Computer Communications 7 th Edition Chapter 12 Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route
More information136 Proceedings of the rd International Teletraffic Congress (ITC 2011)
Gaussian Approximation of CDN Call Level Traffic Andrzej Bak and Piotr Gajowniczek Institute of Telecommunications Warsaw University of Technology Nowowiejska 5/9, -665 Warsaw, Poland Email: bak@tele.pw.edu.pl
More informationResource allocation in networks. Resource Allocation in Networks. Resource allocation
Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers
More informationAlternate Routing Diagram
68 0 Computer Networks Chapter Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone switches
More informationCongestion Control Open Loop
Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental
More informationSELF-SIMILAR INTERNET TRAFFIC AND IMPLICATIONS FOR WIRELESS NETWORK PERFORMANCE IN SUDAN
SELF-SIMILAR INTERNET TRAFFIC AND IMPLICATIONS FOR WIRELESS NETWORK PERFORMANCE IN SUDAN Presented By HUDA M. A. EL HAG University Of Khartoum Faculty Of Mathematical Sciences hudaalhajj@yahoo.com The
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationAn Enhanced Dropping Scheme for Proportional Differentiated Services
An Enhanced Dropping Scheme for Proportional Differentiated Services Jingdi Zeng and Nirwan Ansari Center for Communications and Signal Processing Research Electrical and Computer Engineering Department
More informationOn the Burstiness of the TCP Congestion-Control Mechanism in a Distributed Computing System
Proceedings of the 2th International Conference on Distributed Computing Systems (ICDCS 2). On the Burstiness of the TCP Congestion-Control Mechanism in a Distributed Computing System Peerapol Tinnakornsrisuphap,
More informationInternet Traffic Generation for Large Simulations Scenarios with a Target Traffic Matrix
Internet Traffic Generation for Large Simulations Scenarios with a Target Traffic Matrix KAI BELOW, ULRICH KILLAT Department of Communication Networks Technical University Hamburg-Harburg (TUHH) Denickestr.
More informationAn Inter-arrival Delay Jitter Model using Multi-Structure Network Delay Characteristics for Packet Networks
An Inter-arrival Delay Jitter Model using Multi-Structure Network Delay Characteristics for Packet Networks EdwardJ Daniel, Christopher M White, and Keith A. Teague School of Electrical and Computer Engineering
More informationA Framework For Managing Emergent Transmissions In IP Networks
A Framework For Managing Emergent Transmissions In IP Networks Yen-Hung Hu Department of Computer Science Hampton University Hampton, Virginia 23668 Email: yenhung.hu@hamptonu.edu Robert Willis Department
More informationAn Enhanced Slow-Start Mechanism for TCP Vegas
An Enhanced Slow-Start Mechanism for TCP Vegas Cheng-Yuan Ho a, Yi-Cheng Chan b, and Yaw-Chung Chen a a Department of Computer Science and Information Engineering National Chiao Tung University b Department
More informationCOMPUTER network traffic has a very complex and timedependant
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 2, NO. 4, NOVEMBER 2006 213 Network Traffic Model for Industrial Environment Janusz Kolbusz, Stanisław Paszczyński, Senior Member, IEEE, and Bogdan M.
More informationEnhancements and Performance Evaluation of Wireless Local Area Networks
Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,
More informationKALMAN FILTER BASED CONGESTION CONTROLLER
KALMAN FILTER BASED CONGESTION CONTROLLER Mehdi Mohtashamzadeh Department of Computer Engineering, Soosangerd Branch, Islamic Azad University, Soosangerd, IRAN Mohtashamzadeh@gmail.com ABSTRACT Facing
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationVisualization of Internet Traffic Features
Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,
More informationRouter s Queue Management
Router s Queue Management Manages sharing of (i) buffer space (ii) bandwidth Q1: Which packet to drop when queue is full? Q2: Which packet to send next? FIFO + Drop Tail Keep a single queue Answer to Q1:
More informationIP Traffic Prediction and Equivalent Bandwidth for DAMA TDMA Protocols
IP Traffic and Equivalent Bandwidth for DAMA TDMA Protocols J. Aracil, D. Morato, E. Magaña, M. Izal Universidad Pública de Navarra, 316 Pamplona, SPAIN email:javier.aracil@unavarra.es Abstract The use
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia
More informationWhat Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues
168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity
More informationDoes Circuit Emulation in Metropolitan Gigabit Ethernets require Service Priority?
Institut für Technische Informatik und Kommunikationsnetze Philipp Sager Does Circuit Emulation in Metropolitan Gigabit Ethernets require Service Priority? Post Diploma Thesis NA-2005-02 November 2004
More informationAnalyzing the Receiver Window Modification Scheme of TCP Queues
Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington
More informationIMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET
Nazy Alborz IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road map Introduction to congestion control
More informationA Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,
More informationScheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router
Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all
More informationA Fluid-Flow Characterization of Internet1 and Internet2 Traffic *
A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * Joe Rogers and Kenneth J. Christensen Department of Computer Science and Engineering University of South Florida Tampa, Florida 33620
More informationComparison of Shaping and Buffering for Video Transmission
Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440
More informationWeek 7: Traffic Models and QoS
Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,
More informationIntroduction: Two motivating examples for the analytical approach
Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline
More informationCongestion in Data Networks. Congestion in Data Networks
Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet
More informationAdvanced Computer Networks
Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr
More informationEECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson
EECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson 1.0 Introduction Distributed real-time process control, from a network communication view, involves
More informationA Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction
A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction Hanghang Tong 1, Chongrong Li 2, and Jingrui He 1 1 Department of Automation, Tsinghua University, Beijing 100084,
More informationIEEE Broadband Wireless Access Working Group <
Project IEEE 802.16 Broadband Wireless Access Working Group Title 4IPP Traffic Model for IEEE 802.16.3 Date Submitted Source(s) 2000-10-31 C. R. Baugh, Ph.D. Harris Communications,
More informationOn TCP friendliness of VOIP traffic
On TCP friendliness of VOIP traffic By Rashmi Parthasarathy WSU ID # 10975537 A report submitted in partial fulfillment of the requirements of CptS 555 Electrical Engineering and Computer Science Department
More informationComparative Study of blocking mechanisms for Packet Switched Omega Networks
Proceedings of the 6th WSEAS Int. Conf. on Electronics, Hardware, Wireless and Optical Communications, Corfu Island, Greece, February 16-19, 2007 18 Comparative Study of blocking mechanisms for Packet
More informationQuality of Service (QoS)
Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive
More informationCS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA
CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please
More informationI. INTRODUCTION. Index Terms Long-range dependence, mobility, resource provision, spatial correlation, wireless sensor network (WSN).
1860 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 6, DECEMBER 2011 Spatial Correlation and Mobility-Aware Traffic Modeling for Wireless Sensor Networks Pu Wang, Student Member, IEEE, and Ian F. Akyildiz,
More informationPerformance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks
Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,
More informationEP2210 Scheduling. Lecture material:
EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom
More informationIP Traffic Characterization for Planning and Control
IP Traffic Characterization for Planning and Control V. Bolotin, J. Coombs-Reyes 1, D. Heyman, Y. Levy and D. Liu AT&T Labs, 200 Laurel Avenue, Middletown, NJ 07748, U.S.A. IP traffic modeling and engineering
More informationUCLA Computer Science. Department. Off Campus Gateway. Department. UCLA FDDI Backbone. Servers. Traffic Measurement Connection
Contradictory Relationship between Hurst Parameter and Queueing Performance Ronn Ritke, Xiaoyan Hong and Mario Gerla UCLA { Computer Science Department, 45 Hilgard Ave., Los Angeles, CA 924 ritke@cs.ucla.edu,
More informationConfidence Based Dual Reinforcement Q-Routing: An adaptive online network routing algorithm
Confidence Based Dual Reinforcement Q-Routing: An adaptive online network routing algorithm Shailesh Kumar Dept. of Elec. and Computer Engineering The University of Texas at Austin Austin, TX 78712 USA
More informationThe Failure of TCP in High-Performance Computational Grids
The Failure of TCP in High-Performance Computational Grids W. Feng and P. Tinnakornsrisuphap feng@lanl.gov, tinnakor@cae.wisc.edu Research & Development in Advanced Network Technology (RADIANT) P.O. Box
More informationLecture 14: Congestion Control"
Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Amin Vahdat, Dina Katabi Lecture 14 Overview" TCP congestion control review XCP Overview 2 Congestion Control
More informationCS551 Router Queue Management
CS551 Router Queue Management Bill Cheng http://merlot.usc.edu/cs551-f12 1 Congestion Control vs. Resource Allocation Network s key role is to allocate its transmission resources to users or applications
More informationApplication of Network Calculus to the TSN Problem Space
Application of Network Calculus to the TSN Problem Space Jean Yves Le Boudec 1,2,3 EPFL IEEE 802.1 Interim Meeting 22 27 January 2018 1 https://people.epfl.ch/105633/research 2 http://smartgrid.epfl.ch
More informationReferences. [7] J. G. Gruber. Delay related issues in integrated voice and data networks. In IEEE Trans. on Commun., pages , June 1981.
have adopted the leaky bucket mechanism to satisfy the application required quality of service parameters. The basic performance metrics such as the delay, delay jitter, and system utilization are evaluated
More informationSIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS
SIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS J Wechta, A Eberlein, F Halsall and M Spratt Abstract To meet the networking requirements
More informationADVANCED COMPUTER NETWORKS
ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,
More informationChapter 24 Congestion Control and Quality of Service 24.1
Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More informationResearch Letter A Simple Mechanism for Throttling High-Bandwidth Flows
Hindawi Publishing Corporation Research Letters in Communications Volume 28, Article ID 74878, 5 pages doi:11155/28/74878 Research Letter A Simple Mechanism for Throttling High-Bandwidth Flows Chia-Wei
More informationThree-section Random Early Detection (TRED)
Three-section Random Early Detection (TRED) Keerthi M PG Student Federal Institute of Science and Technology, Angamaly, Kerala Abstract There are many Active Queue Management (AQM) mechanisms for Congestion
More information