A SIMULATION STUDY OF THE IMPACT OF SWITCHING SYSTEMS ON SELF-SIMILAR PROPERTIES OF TRAFFIC. Yunkai Zhou and Harish Sethu

Size: px
Start display at page:

Download "A SIMULATION STUDY OF THE IMPACT OF SWITCHING SYSTEMS ON SELF-SIMILAR PROPERTIES OF TRAFFIC. Yunkai Zhou and Harish Sethu"

Transcription

1 Proceedings of the IEEE Workshop on Statistical Signal and Array Processing Pocono Manor, Pennsylvania, USA, August 14 16, 2000 A SIMULATION STUDY OF THE IMPACT OF SWITCHING SYSTEMS ON SELF-SIMILAR PROPERTIES OF TRAFFIC Yunkai Zhou and Harish Sethu Department of ECE, Drexel University 3141 Chestnut Street Philadelphia, PA {kenty, sethu}@ece.drexel.edu ABSTRACT Recent research has shown that traffic in Ethernet and other networks tends to exhibit properties of self-similarity such as long-range dependence and a high degree of correlation between arrivals. This paper investigates the impact of the switching network on the self-similar properties of the traffic. This simulation study reveals that switching networks tend to reduce the self-similarity of highly self-similar traffic. This is because of the truncation of long bursts due to packet discards, and also because of aggregation of flows through concatenated rather than superposed bursts. On the other hand, switching systems have the opposite effect of increasing the self-similarity of input traffic that has no selfsimilar properties such as traffic with Poisson or uniformly random distributions. This paper also presents simulationbased evidence of the causes behind these phenomena. 1. INTRODUCTION Recent work by many researchers has shown that traffic in Ethernet and other networks tends to be bursty at many or all time-scales [2,6], and that this phenomenon can be mathematically described using the notion of self-similarity. Extensive research has been done on the impact of the selfsimilar properties of traffic on network design issues, such as queueing performance [10], switch performance [3], congestion control [5] and scheduling algorithms [4]. While it is clear that traffic characteristics have an impact on network design issues, it is also true that the properties of a network have an impact on the characteristics of the traffic as it progresses through the network. Very few studies, however, have addressed this issue of changes in traffic characteristics caused by the network [1, 8, 12, 14]. These studies have focused on only the impact of individual components of a network such as the traffic shaper [12], the packet scheduler [1, 14] or a single-server queue [8], as opposed This work was supported in part by U.S. Air Force Contract F to the impact of the entire network as a whole. In addition, studies such as [8] have obtained insightful theoretical results which, however, cannot be readily applied to realistic network environments to solve problems in network engineering. Further, studies such as in [12, 14] only consider short-range burstiness, which does not capture all of the features of self-similar traffic, especially long-range burstiness as observed in [2, 6]. This paper presents a simulation study of the impact of a switching network on the self-similar properties of the traffic, and investigates the causes underlying the observed phenomena. We use self-similar traffic generated using the fractional ARIMA model [7], and a baseline Banyan topology for the switching network. Section 2 discusses the network and the traffic model in greater detail. Our simulation study reveals that switching networks tend to reduce the self-similarity of highly self-similar traffic. This is because of the truncation of long bursts due to packet discards, and also because of the aggregation of flows through concatenated rather than superposed bursts. On the other hand, switching systems also increase the selfsimilarity of input traffic that has no self-similar properties such as traffic with Poisson or uniformly random distributions. Section 3 presents these simulation results and the related analysis with simulation-based evidence of the causes behind the phenomena that yield these results. This section also explains our results in relation to those obtained in [8] and [11]. Section 4 concludes the paper. 2. NETWORK AND TRAFFIC MODEL 2.1. Network Model This study uses an N N baseline Banyan multistage network, with N source nodes and N destination nodes. The switching network consists of log m N stages of m m switching elements. In Banyan topologies, the path between a source end-point and a destination end-point is unique. This property of Banyan networks helps our study of the

2 Inlet 0 Inlet 15 Outlet 0 Outlet 15 Figure 1: Banyan network with N = 16 and m = 4. impact of switching systems, since it eliminates other secondary effects such as due to the choice of a routing algorithm. The popularity of Banyan topologies in real implementations is an additional motivation behind our use of this network model. Figure 1 shows a baseline Banyan network topology with N = 16 and m = 4. Each source node consists of N traffic generators, each of which generates traffic intended for a distinct destination node. Thus, the system consists of a total of N 2 traffic generators. In our simulations, traffic generators are all independent, and generate no more than one packet per cycle. We assume that packet lengths are constant, and that exactly one packet can be transmitted during each cycle across any port. If more than one packet are created in a source node during the same cycle, only one of these is allowed to be transmitted while all the others are buffered in a queue. We assume that the queue sizes at the source nodes are large enough that no packet is ever dropped before it enters the network. Destination nodes drain packets from the output ports of the last stage of switching elements, at the maximum rate of one packet per cycle. In the switching elements, each input port is associated with an input buffer of a fixed small capacity of 4 packet lengths. Each output port contains a dedicated output buffer. In addition, our simulations also use a shared output buffer of capacity equivalent to 4 packets per output port for additional space for the output queues. Under most traffic conditions, the shared buffer improves performance through better buffer utilization. During each cycle in our simulations, switching elements can accept no more than one packet at each input port into the input queue. Each non-empty output queue transmits exactly one packet to the output port in each cycle. We use the round-robin scheduling algorithm to transfer packets to and from the shared queue. A packet arriving at an input port first enters the associated input buffer, then the shared output buffer, and finally the output buffer corresponding to the destination port. Our model ensures that the maximum bandwidth with which the shared buffer can be written into or read from, is equal to the maximum aggregate input or output bandwidth of the switch. Packets arriving at a full input buffer are dropped. No packets, however, are dropped at any other point within the switching element, i.e., packets are forwarded to the shared buffer, or to an output buffer only if there is room available Traffic Model We use the fractional autoregressive integrated moving average (FARIMA) model [7] to synthesize self-similar traffic. FARIMA(p, d, q) is defined as Φ(B)X n = Θ(B) d ɛ n, where B is the backward operator, i.e., Bx n = x n 1. The definition above can be also expressed as X i = d ɛ i θ 1 d ɛ i 1 θ q d ɛ i q +φ 1 X i φ p X i p. (1) In equation (1), d is defined as d = i=0 b i( d)b i, where b 0 ( d) = 1 and b i ( d) = Γ(i + d), i = 1, 2,... Γ(d)Γ(i + 1) When the innovation ɛ i is a stable process with index α, i.e., ɛ i S α (σ, β, µ), the Hurst parameter, H, and the quantities α and d are related by d = H 1/α. In this paper, we use the Hurst parameter as the measure of the degree of self-similarity. The Hurst parameter has a range of 0.5 H 1, and a larger value of H implies a higher degree of self-similarity. Throughout our work, we use α = 1.2, σ = 1, β = 0, µ = 0, p = 50, and q = 400. Θ(B) is generated by selecting θ i in [0, 0.05] randomly and independently. Unlike Θ(B), Φ(B) is generated by selecting p/2 complex roots and their conjugates, since X i converges only if all roots of Φ(B) are in the unit circle. The real and imaginary components of each root are uniform in [0, 0.05]. Finally, we normalize X i to a series of 1 s or 0 s indicating whether or not a packet is generated during a given cycle. The variance-time plot [9] is used to estimate the Hurst parameter of observed network traffic. For a self-similar time series X(k), X m (k) is defined as and X m (k) = 1 m (m+1)k 1 i=mk varx m = varx/m β, X(i), where H = 1 β/2. Taking the logarithm of the equation above, we get, log varx m = β log m + log varx, From the above equation, the Hurst parameter is determined by the slope of the plot of log varx m vs. log m.

3 Hurst Parameter self similar traffic random traffic Number of Bursts (a) Input Traffic Number of Hops Traversed Figure 2: Per-hop changes in self-similarity. 3. SIMULATION RESULTS AND ANALYSIS In a switching element with buffers, a flow typically consumes more space during a bursty period. Under such conditions, depending on the buffer sharing policy and the buffer sizes, either other flows suffer from less empty space, or the bursty flow suffers a higher packet loss rate. In either of these cases, the traffic characteristics change due to delays or losses or both. If two or more flows are bursty at the same time, these effects are further magnified. This section presents our study of these effects on the self-similar properties of traffic. Our study includes two kinds of traffic sources, selfsimilar and uniform random traffic. A uniform random traffic source generates a packet during each cycle with a certain probability p, with uniformly distributed packet destinations. Like Poisson traffic, uniform random traffic has a Hurst parameter of 0.5, indicating that it has no self-similar properties. Our simulation study shows that the impact of a switching system on the self-similarity of the traffic depends on the self-similarity of the input traffic itself. A switching system reduces the self-similarity of highly self-similar traffic, while it increases that of non-self-similar traffic such as uniform random traffic. Figure 2 illustrates this phenomenon of the opposite nature of the effects observed depending on the self-similarity of the input traffic itself. When the traffic is uniformly random, the Hurst parameter increases from 0.5 to 0.64 after the first stage and stays around 0.65 thereafter. When the input traffic has a high level of self-similarity, the Hurst parameter drops from 0.86 to 0.78 after the first stage, and further to 0.76 after the second stage. This interesting phenomenon shows us that, switching networks have the effect of shaping the traffic characteristics to a moderate level of self-similarity. In the following, we investigate Number of Bursts Burst Length (b) Output Traffic Burst Length Figure 3: Distribution of short burst length, (a) input traffic and (b) output traffic. and present simulation-based evidence of the causes of this phenomenon. In the case of uniform random traffic, the probability of packet arrivals during each cycle is independent of the packet arrival pattern during the previous cycles. As the traffic progresses through a switching network with buffers in the switching elements, this independence assumption progressively becomes less valid. Packets for the same output port that independently arrive at different times, due to congestion, end up waiting in the buffers for transmission, and get transmitted in a burst at the output port. This phenomenon adds burstiness to the traffic at each new hop in the path of the traffic, changing the output traffic characteristics to something other than random uniform traffic. Packet arrivals at subsequent hops of the network are now correlated, as reflected in the increased Hurst parameter of the traffic. The distribution of burst lengths in highly self-similar traffic is heavy-tailed, i.e., the probability distribution is given by P [X > x] x α. Such a distribution decays

4 Number H (Input H (Output Percentage of Nodes Traffic) Traffic) Decrease % % % Table 1: Self-similarity of traffic vs. number of nodes. Hurst Parameter m=16 m=4 m=2 more slowly than exponentially, causing a high likelihood of long bursts in self-similar traffic. However, because of congestion and limited buffering capacities in the switching elements, long bursts do not easily survive in switching networks. In fact, long bursts self-destruct through causing congestion, triggering discarding of packets and thus breaking the long burst into smaller ones. For example, in our simulations, the longest burst observed at the traffic source had more than 6,000 consecutive packets, while the output traffic had no bursts longer than 900 packets. This is also illustrated in Figure 3, which shows that the distribution of short burst lengths of the input and the output traffic of the network. The output traffic has a larger percentage of shorter bursts, and with a significantly smaller average burst length. Note that the relative increase in shorter bursts increases the value of the index α in a heavy-tailed distribution given by P [X > x] x α. This, in turn, has the effect of reducing the Hurst parameter since, as shown in [13], H = (3 α)/2. In addition to the reduction in burst lengths, the other reason for this phenomenon is that aggregation of flows in networks typically has the effect of reducing variation over larger scales. It should be understood that this phenomenon is quite different from that shown in [11]. Willinger et al. show that a superposition of many ON/OFF traffic sources exhibits properties of self-similarity when the lengths of the ON and OFF periods are independent and follow a heavytailed distribution. Because of the limited bandwidth of output links, a true superposition is never possible in switching networks. Bursts are actually concatenated rather than superposed on top of each other on the output links. A superposition increases variation across scales, but a concatenation actually has the effect of spreading out the peaks and thus smoothening out the variations. The phenomenon discussed above can be verified through simulation using a single m m switching element and varying m. In this model, each output link is fed by m selfsimilar traffic sources at the inputs. Table 1 shows the impact on the self-similarity of the output traffic for different values of m. As can be observed from Table 1, the selfsimilarity of traffic decreases as the level of aggregation increases. This reduction in the self-similarity of traffic with aggregation, is also the reason that highly self-similar traffic Stage Number Figure 4: Per-hop changes for different switch sizes. reduces in self-similarity as it progresses through each hop in the switching network. This is easily understood from noting that the output links further hops away from the traffic sources carry more of an aggregated traffic than the ones closer to the sources. The same phenomenon is apparent in the impact of the size of switching elements used in the topology of a switching network. A network designed using 2 2 switching elements, as compared to 4 4 switching elements, will contribute to a smaller decrease in the observed Hurst parameter after the first hop. A network with 4 4 switching elements achieves the same level of aggregation in fewer hops than one using 2 2 switching elements. Figure 4 shows the perhop changes in the self-similarity of traffic for switching networks with different sizes of switching elements. It is worthwhile to discuss our results in relation to those obtained by Song et al. [8] in their study of self-similarity of output traffic at a single server with an infinite buffer. It is proved in [8] that if the queue length has finite variance, the self-similar properties of input and output traffic remain the same. In fact, it is shown that both the input and output traffic have the same Hurst parameter. Noting that it is unrealistic to assume an infinite buffer, the authors in [8] argue that in real switches, the condition that queue length has finite variance is always satisfied. However, another important impact of finite buffers should be considered traffic can be accepted into the buffer only if there is available space. In the absence of a feedback mechanism, packet discarding becomes inevitable which changes the traffic characteristics; in the presence of a feedback mechanism such as credit-based flow control, the characteristics of arriving traffic itself changes. A second important reason for the apparent discrepancy between our results and that in [8] is that our results use the self-similar properties of aggregate traffic at each output link, while the results in [8] compare

5 the properties of individual flows before and after service by the server. Our approach to only analyze aggregate traffic is motivated by the fact that most switches and routers do not maintain per-flow queueing, and therefore, only the characteristics of the aggregate traffic at each input or output link is important to the performance and related issues in the design of switches and routers. All of the results presented in this paper were obtained at moderate or heavy traffic loads. As one might expect, the impact of the switching network on the traffic characteristics is minimal when the traffic load is small. 4. CONCLUSION In this paper, we have presented simulation studies that show that highly self-similar input traffic reduces in its selfsimilarity as it progresses through a switching network. Our analysis indicates that this phenomenon is caused by the truncation of long bursts due to packet discarding, and by the aggregation of flows through concatenation of bursts. On the other hand, during periods of congestion in networks with buffers, input traffic with no self-similar properties increases in self-similarity as it progresses through the network. These results have important implications relevant to the design of routers and switches. For example, our results suggest that core Internet routers receive traffic that is much less self-similar than traffic that emerges out of border routers directly connected to Ethernet LANs. Acknowledgments The simulation code to generate the self-similar traffic was partly written by Haiguang Cheng. The authors would also like to gratefully acknowledge his contribution through discussions that further improved the traffic model. REFERENCES [1] S. Borst, O. Boxma and P. Jelenković. Asymptotic Behavior of Generalized Processor Sharing with Long-Tailed Traffic Sources. Proceedings of IEEE INFOCOMM, Tel Aviv, Israel, Mar [2] M. E. Crovella and A. Bestavros. Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes. IEEE/ACM Transactions on Networking, vol 5, no. 6, Dec [3] S. Fong and S. Singh. Performance Evaluation of Shared-Buffer ATM Switches Under Self-Similar Traffic. Proceedings of IEEE International Performance, Computing, and Communications Conference, Arizona, [4] R. G. Garroppo, S. Giordano, S. Miduri, M. Pagano and F. Russo. Statistical Multiplexing of Self-Similar VBR Video-conferencing Traffic. Proceedings of GLOBECOM, [5] A. Gersht, G. Pathak and A. Shulman. Burst Level Congestion Control in ATM Networks. Proceedings of IEEE Symposium on Computer and Communications, Athens, Greece, July [6] W. E. Leland, M. S. Taqqu, W. Willinger and D. V. Wilson. On the Self-Similar Nature of Ethernet Traffic (Extended Version). IEEE/ACM Transactions on Networking, vol. 2, no. 1, Feb [7] G. Samorodnitsky and M. S. Taqqu. Stable Non- Gaussian Random Processes: Stochastic Models with Infinite Variance. Chapman & Hall, NY, [8] S. Song, J. K.-Y. Ng and B. Tang. On the Self- Similarity Property of the Output Process from a Network Server with Self-Similar Input Traffic. Proceedings of Sixth International Conference on Real-Time Computing Systems and Applications, pp , Dec [9] W. Stallings. High-Speed Networks: TCP/IP and ATM Design Principles. Prentice Hall, Upper Saddle River, NJ [10] B. Tsybakov and N. D. Georganas. Overflow Probability in an ATM Queue with Self-Similar Input Traffic. Proceedings of IEEE International Conference on Communications, Montreal, Canada, June [11] W. Willinger, M. S. Taqqu, R. Sherman and D. V. Wilson. Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level. IEEE/ACM Transactions on Networking, vol.5, no.1, Feb [12] S. Wittevrongel and H. Bruneel. Output Traffic Analysis of a Leaky Bucket Traffic Shaper Fed by a Bursty Source. Proceedings of IEEE International Conference on Communications, pp , [13] X. Yang, A. P. Petropulu and V. Adams. The Extended ON/OFF Model for High-Speed Data Network. Workshop on Applications of Heavy Tailed Distributions in Economics, Engineering and Statistics, Washington, D.C., Jun [14] H. Zhang. Service Disciplines for Guaranteed Performance Service in Packet-Switching Networks. Proceedings of the IEEE, vol. 83, no. 10, Oct

Buffer Management for Self-Similar Network Traffic

Buffer Management for Self-Similar Network Traffic Buffer Management for Self-Similar Network Traffic Faranz Amin Electrical Engineering and computer science Department Yazd University Yazd, Iran farnaz.amin@stu.yazd.ac.ir Kiarash Mizanian Electrical Engineering

More information

Virtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements

Virtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements Proceedings of the Applied Telecommunication Symposium (part of Advanced Simulation Technologies Conference) Seattle, Washington, USA, April 22 26, 21 Virtual Circuit Blocking Probabilities in an ATM Banyan

More information

Active Queue Management for Self-Similar Network Traffic

Active Queue Management for Self-Similar Network Traffic Active Queue Management for Self-Similar Network Traffic Farnaz Amin*, Kiarash Mizanain**, and Ghasem Mirjalily*** * Electrical Engineering and computer science Department, Yazd University, farnaz.amin@stu.yazduni.ac.ir

More information

Characterizing Internet Load as a Non-regular Multiplex of TCP Streams

Characterizing Internet Load as a Non-regular Multiplex of TCP Streams Characterizing Internet Load as a Non-regular Multiplex of TCP Streams J. Aracil, D. Morató Dpto. Automática y Computación Universidad Pública de Navarra {javier.aracil,daniel.morato}@unavarra.es http://www.tlm.unavarra.es

More information

Advanced Internet Technologies

Advanced Internet Technologies Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/

More information

THE TCP specification that specifies the first original

THE TCP specification that specifies the first original 1 Median Filtering Simulation of Bursty Traffic Auc Fai Chan, John Leis Faculty of Engineering and Surveying University of Southern Queensland Toowoomba Queensland 4350 Abstract The estimation of Retransmission

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

SIMULATING CDPD NETWORKS USING OPNET

SIMULATING CDPD NETWORKS USING OPNET SIMULATING CDPD NETWORKS USING OPNET Michael Jiang, Stephen Hardy, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia Canada V5A 1S6 {zjiang, steve,

More information

Performance Study of Routing Algorithms for LEO Satellite Constellations

Performance Study of Routing Algorithms for LEO Satellite Constellations Performance Study of Routing Algorithms for LEO Satellite Constellations Ioannis Gragopoulos, Evangelos Papapetrou, Fotini-Niovi Pavlidou Aristotle University of Thessaloniki, School of Engineering Dept.

More information

Congestion Propagation among Routers in the Internet

Congestion Propagation among Routers in the Internet Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,

More information

Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network

Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Qing (Kenny) Shao and Ljiljana Trajkovic {qshao, ljilja}@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl

More information

Multicast Transport Protocol Analysis: Self-Similar Sources *

Multicast Transport Protocol Analysis: Self-Similar Sources * Multicast Transport Protocol Analysis: Self-Similar Sources * Mine Çağlar 1 Öznur Özkasap 2 1 Koç University, Department of Mathematics, Istanbul, Turkey 2 Koç University, Department of Computer Engineering,

More information

Modelling data networks research summary and modelling tools

Modelling data networks research summary and modelling tools Modelling data networks research summary and modelling tools a 1, 3 1, 2 2, 2 b 0, 3 2, 3 u 1, 3 α 1, 6 c 0, 3 v 2, 2 β 1, 1 Richard G. Clegg (richard@richardclegg.org) December 2011 Available online at

More information

Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network

Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Qing (Kenny) Shao and Ljiljana Trajkovic {qshao, ljilja}@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl

More information

A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING

A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING Timothy D. Neame,l Moshe Zukerman 1 and Ronald G. Addie2 1 Department of Electrical and 2 Department of Mathematics Electronic Engineering, and Computer

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada

More information

On the Impact of Burst Assembly on Self- Similarity at the Edge Router in Optical Burst Switched Networks

On the Impact of Burst Assembly on Self- Similarity at the Edge Router in Optical Burst Switched Networks On the Impact of Burst Assembly on Self- Similarity at the Edge Router in Optical Burst Switched Networks Siamak Azodolmolky, Anna Tzanakaki, Ioannis Tomkos Athens Information Technology (AIT), P.O.Box

More information

Self Similar Network Traffic present by Carl Minton. Definition of Self Similarity

Self Similar Network Traffic present by Carl Minton. Definition of Self Similarity Self Similar Network Traffic present by Carl Minton Agenda Definition of self similarity Quantifying self similarity Self similarity of network traffic Implications for network performance Pointers for

More information

Performance Evaluation. of Input and Virtual Output Queuing on. Self-Similar Traffic

Performance Evaluation. of Input and Virtual Output Queuing on. Self-Similar Traffic Page 1 of 11 CS 678 Topics in Internet Research Progress Report Performance Evaluation of Input and Virtual Output Queuing on Self-Similar Traffic Submitted to Zartash Afzal Uzmi By : Group # 3 Muhammad

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

Dynamics of Feedback-induced Packet Delay in Power-law Networks

Dynamics of Feedback-induced Packet Delay in Power-law Networks Dynamics of Feedback-induced Packet Delay in Power-law Networks Takahiro Hirayama, Shin ichi Arakawa, Ken-ichi Arai, and Masayuki Murata Graduate School of Information Science and Technology Osaka University,

More information

INTERNET OVER DIGITAL VIDEO BROADCAST: PERFORMANCE ISSUES

INTERNET OVER DIGITAL VIDEO BROADCAST: PERFORMANCE ISSUES INTERNET OVER DIGITAL VIDEO BROADCAST: PERFORMANCE ISSUES Hakan Yılmaz TÜBİTAK Marmara Research Center Information Technologies Research Institute Kocaeli, Turkey hy@btae.mam.gov.tr Bülent Sankur Boğaziçi

More information

An Approach for Enhanced Performance of Packet Transmission over Packet Switched Network

An Approach for Enhanced Performance of Packet Transmission over Packet Switched Network ISSN (e): 2250 3005 Volume, 06 Issue, 04 April 2016 International Journal of Computational Engineering Research (IJCER) An Approach for Enhanced Performance of Packet Transmission over Packet Switched

More information

Network Model for Delay-Sensitive Traffic

Network Model for Delay-Sensitive Traffic Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.

More information

Traffic Modeling of Communication Networks

Traffic Modeling of Communication Networks EÖTVÖS LORÁND UNIVERSITY, BUDAPEST Traffic Modeling of Communication Networks PÉTER VADERNA THESES OF PHD DISSERTATION Doctoral School: Physics Director: Prof. Zalán Horváth Doctoral Program: Statistical

More information

Performance Study of Adaptive Routing Algorithms for LEO Satellite Constellations under Self-Similar and Poisson Traffic

Performance Study of Adaptive Routing Algorithms for LEO Satellite Constellations under Self-Similar and Poisson Traffic Performance Study of Adaptive Routing Algorithms for LEO Satellite Constellations under Self-Similar and Poisson Traffic Ioannis Gragopoulos, Evangelos Papapetrou, Fotini-Niovi Pavlidou Aristotle University

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz Maryam Keyvani Milan Nikolic Ljiljana Trajkovic SIMULATION OF PACKET DATA NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road

More information

SIMULATING CDPD NETWORKS USING OPNET

SIMULATING CDPD NETWORKS USING OPNET Michael Jiang Stephen Hardy Ljiljana Trajkovic SIMULATING CDPD NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road Map Introduction Simulation

More information

Stream Sessions: Stochastic Analysis

Stream Sessions: Stochastic Analysis Stream Sessions: Stochastic Analysis Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath and Dr. Kumar Outline Loose bounds

More information

Performance of a Switched Ethernet: A Case Study

Performance of a Switched Ethernet: A Case Study Performance of a Switched Ethernet: A Case Study M. Aboelaze A Elnaggar Dept. of Computer Science Dept of Electrical Engineering York University Sultan Qaboos University Toronto Ontario Alkhod 123 Canada

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture

Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture Robert D. allaway and Michael Devetsikiotis Department of Electrical

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

Long-Range Dependence of Internet Traffic Aggregates

Long-Range Dependence of Internet Traffic Aggregates Long-Range Dependence of Internet Traffic Aggregates Solange Lima, Magda Silva, Paulo Carvalho, Alexandre Santos, and Vasco Freitas Universidade do Minho, Departamento de Informatica, 4710-059 Braga, Portugal

More information

Load Balancing with Minimal Flow Remapping for Network Processors

Load Balancing with Minimal Flow Remapping for Network Processors Load Balancing with Minimal Flow Remapping for Network Processors Imad Khazali and Anjali Agarwal Electrical and Computer Engineering Department Concordia University Montreal, Quebec, Canada Email: {ikhazali,

More information

Appendix A. Methodology

Appendix A. Methodology 193 Appendix A Methodology In this appendix, I present additional details of the evaluation of Sync-TCP described in Chapter 4. In Section A.1, I discuss decisions made in the design of the network configuration.

More information

An Enhanced Dynamic Packet Buffer Management

An Enhanced Dynamic Packet Buffer Management An Enhanced Dynamic Packet Buffer Management Vinod Rajan Cypress Southeast Design Center Cypress Semiconductor Cooperation vur@cypress.com Abstract A packet buffer for a protocol processor is a large shared

More information

A VERIFICATION OF SELECTED PROPERTIES OF TELECOMMUNICATION TRAFFIC GENERATED BY OPNET SIMULATOR.

A VERIFICATION OF SELECTED PROPERTIES OF TELECOMMUNICATION TRAFFIC GENERATED BY OPNET SIMULATOR. UNIVERSITY OF LJUBLJANA Faculty of Electrical Engineering Daniel Alonso Martinez A VERIFICATION OF SELECTED PROPERTIES OF TELECOMMUNICATION TRAFFIC GENERATED BY OPNET SIMULATOR. Erasmus exchange project

More information

Analysis of Random Access Protocol under Bursty Traffic

Analysis of Random Access Protocol under Bursty Traffic Analysis of Random Access Protocol under Bursty Traffic Jianbo Gao and Izhak Rubin Electrical Engineering Department, University of California, Los Angeles, CA 90095 {jbgao, rubin}@ee.ucla.edu Abstract.

More information

Utilizing Neural Networks to Reduce Packet Loss in Self-Similar Teletraffic Patterns

Utilizing Neural Networks to Reduce Packet Loss in Self-Similar Teletraffic Patterns Utilizing Neural Networks to Reduce Packet Loss in Self-Similar Teletraffic Patterns Homayoun Yousefi zadeh; EECS Dept; UC, Irvine Edmond A. Jonckheere; EE-Systems Dept; USC John A. Silvester; EE-Systems

More information

Performance Consequences of Partial RED Deployment

Performance Consequences of Partial RED Deployment Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing

More information

William Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing

William Stallings Data and Computer Communications 7 th Edition. Chapter 12 Routing William Stallings Data and Computer Communications 7 th Edition Chapter 12 Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route

More information

136 Proceedings of the rd International Teletraffic Congress (ITC 2011)

136 Proceedings of the rd International Teletraffic Congress (ITC 2011) Gaussian Approximation of CDN Call Level Traffic Andrzej Bak and Piotr Gajowniczek Institute of Telecommunications Warsaw University of Technology Nowowiejska 5/9, -665 Warsaw, Poland Email: bak@tele.pw.edu.pl

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

Alternate Routing Diagram

Alternate Routing Diagram 68 0 Computer Networks Chapter Routing Routing in Circuit Switched Network Many connections will need paths through more than one switch Need to find a route Efficiency Resilience Public telephone switches

More information

Congestion Control Open Loop

Congestion Control Open Loop Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental

More information

SELF-SIMILAR INTERNET TRAFFIC AND IMPLICATIONS FOR WIRELESS NETWORK PERFORMANCE IN SUDAN

SELF-SIMILAR INTERNET TRAFFIC AND IMPLICATIONS FOR WIRELESS NETWORK PERFORMANCE IN SUDAN SELF-SIMILAR INTERNET TRAFFIC AND IMPLICATIONS FOR WIRELESS NETWORK PERFORMANCE IN SUDAN Presented By HUDA M. A. EL HAG University Of Khartoum Faculty Of Mathematical Sciences hudaalhajj@yahoo.com The

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

An Enhanced Dropping Scheme for Proportional Differentiated Services

An Enhanced Dropping Scheme for Proportional Differentiated Services An Enhanced Dropping Scheme for Proportional Differentiated Services Jingdi Zeng and Nirwan Ansari Center for Communications and Signal Processing Research Electrical and Computer Engineering Department

More information

On the Burstiness of the TCP Congestion-Control Mechanism in a Distributed Computing System

On the Burstiness of the TCP Congestion-Control Mechanism in a Distributed Computing System Proceedings of the 2th International Conference on Distributed Computing Systems (ICDCS 2). On the Burstiness of the TCP Congestion-Control Mechanism in a Distributed Computing System Peerapol Tinnakornsrisuphap,

More information

Internet Traffic Generation for Large Simulations Scenarios with a Target Traffic Matrix

Internet Traffic Generation for Large Simulations Scenarios with a Target Traffic Matrix Internet Traffic Generation for Large Simulations Scenarios with a Target Traffic Matrix KAI BELOW, ULRICH KILLAT Department of Communication Networks Technical University Hamburg-Harburg (TUHH) Denickestr.

More information

An Inter-arrival Delay Jitter Model using Multi-Structure Network Delay Characteristics for Packet Networks

An Inter-arrival Delay Jitter Model using Multi-Structure Network Delay Characteristics for Packet Networks An Inter-arrival Delay Jitter Model using Multi-Structure Network Delay Characteristics for Packet Networks EdwardJ Daniel, Christopher M White, and Keith A. Teague School of Electrical and Computer Engineering

More information

A Framework For Managing Emergent Transmissions In IP Networks

A Framework For Managing Emergent Transmissions In IP Networks A Framework For Managing Emergent Transmissions In IP Networks Yen-Hung Hu Department of Computer Science Hampton University Hampton, Virginia 23668 Email: yenhung.hu@hamptonu.edu Robert Willis Department

More information

An Enhanced Slow-Start Mechanism for TCP Vegas

An Enhanced Slow-Start Mechanism for TCP Vegas An Enhanced Slow-Start Mechanism for TCP Vegas Cheng-Yuan Ho a, Yi-Cheng Chan b, and Yaw-Chung Chen a a Department of Computer Science and Information Engineering National Chiao Tung University b Department

More information

COMPUTER network traffic has a very complex and timedependant

COMPUTER network traffic has a very complex and timedependant IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 2, NO. 4, NOVEMBER 2006 213 Network Traffic Model for Industrial Environment Janusz Kolbusz, Stanisław Paszczyński, Senior Member, IEEE, and Bogdan M.

More information

Enhancements and Performance Evaluation of Wireless Local Area Networks

Enhancements and Performance Evaluation of Wireless Local Area Networks Enhancements and Performance Evaluation of Wireless Local Area Networks Jiaqing Song and Ljiljana Trajkovic Communication Networks Laboratory Simon Fraser University Burnaby, BC, Canada E-mail: {jsong,

More information

KALMAN FILTER BASED CONGESTION CONTROLLER

KALMAN FILTER BASED CONGESTION CONTROLLER KALMAN FILTER BASED CONGESTION CONTROLLER Mehdi Mohtashamzadeh Department of Computer Engineering, Soosangerd Branch, Islamic Azad University, Soosangerd, IRAN Mohtashamzadeh@gmail.com ABSTRACT Facing

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Visualization of Internet Traffic Features

Visualization of Internet Traffic Features Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,

More information

Router s Queue Management

Router s Queue Management Router s Queue Management Manages sharing of (i) buffer space (ii) bandwidth Q1: Which packet to drop when queue is full? Q2: Which packet to send next? FIFO + Drop Tail Keep a single queue Answer to Q1:

More information

IP Traffic Prediction and Equivalent Bandwidth for DAMA TDMA Protocols

IP Traffic Prediction and Equivalent Bandwidth for DAMA TDMA Protocols IP Traffic and Equivalent Bandwidth for DAMA TDMA Protocols J. Aracil, D. Morato, E. Magaña, M. Izal Universidad Pública de Navarra, 316 Pamplona, SPAIN email:javier.aracil@unavarra.es Abstract The use

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues 168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity

More information

Does Circuit Emulation in Metropolitan Gigabit Ethernets require Service Priority?

Does Circuit Emulation in Metropolitan Gigabit Ethernets require Service Priority? Institut für Technische Informatik und Kommunikationsnetze Philipp Sager Does Circuit Emulation in Metropolitan Gigabit Ethernets require Service Priority? Post Diploma Thesis NA-2005-02 November 2004

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET

IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET Nazy Alborz IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road map Introduction to congestion control

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all

More information

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic *

A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * A Fluid-Flow Characterization of Internet1 and Internet2 Traffic * Joe Rogers and Kenneth J. Christensen Department of Computer Science and Engineering University of South Florida Tampa, Florida 33620

More information

Comparison of Shaping and Buffering for Video Transmission

Comparison of Shaping and Buffering for Video Transmission Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

EECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson

EECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson EECS 428 Final Project Report Distributed Real-Time Process Control Over TCP and the Internet Brian Robinson 1.0 Introduction Distributed real-time process control, from a network communication view, involves

More information

A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction

A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction A Boosting-Based Framework for Self-Similar and Non-linear Internet Traffic Prediction Hanghang Tong 1, Chongrong Li 2, and Jingrui He 1 1 Department of Automation, Tsinghua University, Beijing 100084,

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project IEEE 802.16 Broadband Wireless Access Working Group Title 4IPP Traffic Model for IEEE 802.16.3 Date Submitted Source(s) 2000-10-31 C. R. Baugh, Ph.D. Harris Communications,

More information

On TCP friendliness of VOIP traffic

On TCP friendliness of VOIP traffic On TCP friendliness of VOIP traffic By Rashmi Parthasarathy WSU ID # 10975537 A report submitted in partial fulfillment of the requirements of CptS 555 Electrical Engineering and Computer Science Department

More information

Comparative Study of blocking mechanisms for Packet Switched Omega Networks

Comparative Study of blocking mechanisms for Packet Switched Omega Networks Proceedings of the 6th WSEAS Int. Conf. on Electronics, Hardware, Wireless and Optical Communications, Corfu Island, Greece, February 16-19, 2007 18 Comparative Study of blocking mechanisms for Packet

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information

I. INTRODUCTION. Index Terms Long-range dependence, mobility, resource provision, spatial correlation, wireless sensor network (WSN).

I. INTRODUCTION. Index Terms Long-range dependence, mobility, resource provision, spatial correlation, wireless sensor network (WSN). 1860 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 6, DECEMBER 2011 Spatial Correlation and Mobility-Aware Traffic Modeling for Wireless Sensor Networks Pu Wang, Student Member, IEEE, and Ian F. Akyildiz,

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

EP2210 Scheduling. Lecture material:

EP2210 Scheduling. Lecture material: EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom

More information

IP Traffic Characterization for Planning and Control

IP Traffic Characterization for Planning and Control IP Traffic Characterization for Planning and Control V. Bolotin, J. Coombs-Reyes 1, D. Heyman, Y. Levy and D. Liu AT&T Labs, 200 Laurel Avenue, Middletown, NJ 07748, U.S.A. IP traffic modeling and engineering

More information

UCLA Computer Science. Department. Off Campus Gateway. Department. UCLA FDDI Backbone. Servers. Traffic Measurement Connection

UCLA Computer Science. Department. Off Campus Gateway. Department. UCLA FDDI Backbone. Servers. Traffic Measurement Connection Contradictory Relationship between Hurst Parameter and Queueing Performance Ronn Ritke, Xiaoyan Hong and Mario Gerla UCLA { Computer Science Department, 45 Hilgard Ave., Los Angeles, CA 924 ritke@cs.ucla.edu,

More information

Confidence Based Dual Reinforcement Q-Routing: An adaptive online network routing algorithm

Confidence Based Dual Reinforcement Q-Routing: An adaptive online network routing algorithm Confidence Based Dual Reinforcement Q-Routing: An adaptive online network routing algorithm Shailesh Kumar Dept. of Elec. and Computer Engineering The University of Texas at Austin Austin, TX 78712 USA

More information

The Failure of TCP in High-Performance Computational Grids

The Failure of TCP in High-Performance Computational Grids The Failure of TCP in High-Performance Computational Grids W. Feng and P. Tinnakornsrisuphap feng@lanl.gov, tinnakor@cae.wisc.edu Research & Development in Advanced Network Technology (RADIANT) P.O. Box

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Amin Vahdat, Dina Katabi Lecture 14 Overview" TCP congestion control review XCP Overview 2 Congestion Control

More information

CS551 Router Queue Management

CS551 Router Queue Management CS551 Router Queue Management Bill Cheng http://merlot.usc.edu/cs551-f12 1 Congestion Control vs. Resource Allocation Network s key role is to allocate its transmission resources to users or applications

More information

Application of Network Calculus to the TSN Problem Space

Application of Network Calculus to the TSN Problem Space Application of Network Calculus to the TSN Problem Space Jean Yves Le Boudec 1,2,3 EPFL IEEE 802.1 Interim Meeting 22 27 January 2018 1 https://people.epfl.ch/105633/research 2 http://smartgrid.epfl.ch

More information

References. [7] J. G. Gruber. Delay related issues in integrated voice and data networks. In IEEE Trans. on Commun., pages , June 1981.

References. [7] J. G. Gruber. Delay related issues in integrated voice and data networks. In IEEE Trans. on Commun., pages , June 1981. have adopted the leaky bucket mechanism to satisfy the application required quality of service parameters. The basic performance metrics such as the delay, delay jitter, and system utilization are evaluated

More information

SIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS

SIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS SIMULATION BASED ANALYSIS OF THE INTERACTION OF END-TO-END AND HOP-BY-HOP FLOW CONTROL SCHEMES IN PACKET SWITCHING LANS J Wechta, A Eberlein, F Halsall and M Spratt Abstract To meet the networking requirements

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Research Letter A Simple Mechanism for Throttling High-Bandwidth Flows

Research Letter A Simple Mechanism for Throttling High-Bandwidth Flows Hindawi Publishing Corporation Research Letters in Communications Volume 28, Article ID 74878, 5 pages doi:11155/28/74878 Research Letter A Simple Mechanism for Throttling High-Bandwidth Flows Chia-Wei

More information

Three-section Random Early Detection (TRED)

Three-section Random Early Detection (TRED) Three-section Random Early Detection (TRED) Keerthi M PG Student Federal Institute of Science and Technology, Angamaly, Kerala Abstract There are many Active Queue Management (AQM) mechanisms for Congestion

More information