Comparative study of LTE simulations with the ns-3 and the Vienna simulators

Size: px
Start display at page:

Download "Comparative study of LTE simulations with the ns-3 and the Vienna simulators"

Transcription

1 Comparative study of LTE simulations with the ns-3 and the Vienna simulators Thiago Abreu 1 Bruno Baynat 1 Marouen Gachaoui 2 Tania Jimenez 2 Narcisse Nya 1 1 University Pierre et Marie Curie - LIP6 2 LIA/CERI University of Avignon August /23 SimuTools Comparative study with ns-3 and Vienna

2 Acknowledgment This work has been carried out in the framework of IDEFIX project, funded by the ANR under the contract number ANR-13-INFR /23 SimuTools Comparative study with ns-3 and Vienna

3 Goals of this work Give a performance comparison of two open source simulators in the context of LTE networks Evaluate their accuracy and compare their efficiency by simulating four basic scenarios with well-known analytical results Understand the software architecture of the simulators and their capabilities to simulate more realistic scenarios List the implementation issues and propose possible solutions to improve the simulators 3/23 SimuTools Comparative study with ns-3 and Vienna

4 Outline Introduction to ns-3 and Vienna simulators Simulated scenarios Implementation Simulators limitations Simulation results Performance comparison Conclusions 4/23 SimuTools Comparative study with ns-3 and Vienna

5 Vienna simulator A bench of MATLAB classes, functions and scripts Time-step discrete-event simulator for LTE networks Advances the time by time slices of 1ms (the duration of one Transmission Time Interval (TTI) in the LTE standard) Very precise on the modeling of the physical layer Performs many calculations at the physical layer level every time-step Trace files for each user at the end of each simulation (received bits, SINR, throughput..) 5/23 SimuTools Comparative study with ns-3 and Vienna

6 ns-3 simulator ns-3 is a research-oriented, discrete-event network simulator Open source licensing (GNU GPLv2) and development model Python scripts or C++ programs Several modules : designed to simulate different technologies and scenarios LTE module : developed by the LENA project following the 3GPP LTE standard specifications 6/23 SimuTools Comparative study with ns-3 and Vienna

7 Simulators comparison Vienna: - Specialized LTE network simulator - Clock advanced by time-step of 1ms - Performs physical layer calculations every time-step - Traces are simple to work with - Not modular core ns-3: - General network simulator - Clock advanced by the date of the next event - Directly uses tables provided by the standard specifications - Processing traces can be cumbersome - Modular, documented core /23 SimuTools Comparative study with ns-3 and Vienna

8 Simulated scenarios One LTE cell = N s elementary resources per frame Static users using the same MCS over the whole cell 1 resource = m bits/frame, each frame transmitted every T f Cell capacity C = mns T f bits/s Four basic scenarios with well-known analytical results Differentiate themselves by the nature of the traffic (data or voice) and by the number of sources (infinite or finite): - Data traffic with infinite source (DI) - Data traffic with finite source (DF) - Voice traffic with infinite source (VI) - Voice traffic with finite source (VF) 8/23 SimuTools Comparative study with ns-3 and Vienna

9 DI : Data traffic with infinite source Model by a M/M/1/ / /Procesor Sharing (PS) queue Requests for data transmission arrive to the cell according to a Poisson process with rate λ Data transmission = mean amount of data x on to be transferred Cell capacity C equally shared among active users Service rate µ = C x on /23 SimuTools Comparative study with ns-3 and Vienna

10 DF : Data traffic with finite source Model by a M/M/1/N/N/PS queue Finite number N of users generating an ON/OFF traffic ON = average volume of data x on to be transferred OFF = idle period t off Cell capacity C equally shared among active users Arrival rate λ = 1 t off Service rate µ = C x on ( ) ( ) ( ) /23 SimuTools Comparative study with ns-3 and Vienna

11 VI : Voice traffic with infinite source Model by a M/M/S/S queue Requests for voice calls arrive to the cell according to a Poisson process with rate λ Voice call = mean active period t on, requires a throughput of v bits/s Maximum number of simultaneous voice calls can be served = S = C v Service rate µ = 1 t on /23 SimuTools Comparative study with ns-3 and Vienna

12 VF : Voice traffic with finite source Finite number N of users generating an ON/OFF traffic ON = voice call : mean active period t on OFF = idle period t off S simultaneous voice calls can be served by the cell Arrival rate λ = 1 t off Service rate µ = 1 t on Two cases : up: N S, down: N > S ( ) ( ) ( ) ( ) ( ) ( ) ( + ) /23 SimuTools Comparative study with ns-3 and Vienna

13 Vienna simulator The code is not well structured : not easy to add new modules without modifying many other files. Issues: - Clock advanced by TTI, physical layer calculations performed every time-step very high simulation run-time unable to simulate realistic scenarios with long simulation times and high loaded systems - Constant number of users along the simulation unable to simulate infinite source scenarios - Existing ON/OFF traffic modules must be modified - Scheduling policy with S servers not implemented unable to simulate voice cases 13/23 SimuTools Comparative study with ns-3 and Vienna

14 Vienna simulator Solutions: - Improve the computation load: deactivate and detach OFF users from the system perform the physical layer calculations only when a user perceives a channel condition changing (instead of every TTI) - Implement new modules making the simulator capable of adding and deleting users during the simulation - Modify the existing ON/OFF traffic modules and add new ones - Implement a new scheduling policy for the voice cases (with S servers) 4/23 SimuTools Comparative study with ns-3 and Vienna

15 ns-3 simulator Issues: - ON/OFF application for data traffic not implemented - Number of users is limited to 320 per cell unable to carry out simulations of infinite sources Solutions: - Implement a new ON/OFF application to model data transmissions - Reuse of served users to model new ones to overcome the limit of 320 users per cell 15/23 SimuTools Comparative study with ns-3 and Vienna

16 DI scenario Metrics of interest: - Average number of active users (Q) - Mean throughput a user obtains Both simulators are accurate with small relative errors and narrow confidence intervals 14 8 Q ns-3 Q Vienna Q ns-3 throughput Vienna throughput theoretical throughput (Mbits/s) System bandwidth 5MHz (25 RBs) Cell capacity 18.3Mbits/s (best MCS in the cell) Scheduler Round Robin Mean size xon 1.7Mbits Mean inter-arrival time toff from 100ms to 150ms Simulation time 300s Table: Simulation parameters t off (ms) 16/23 SimuTools Comparative study with ns-3 and Vienna

17 DF scenario Metrics of interest: - Average number of active users (Q) - Mean throughput a user obtains Good accuracy: narrow confidence intervals 8 9 Q ns-3 Q Vienna Q ns-3 throughput Vienna throughput theoretical throughput (Mbits/s) System bandwidth 5MHz (25 RBs) Cell capacity 18.3 Mbits/s (best MCS in the cell) Scheduler Round Robin number of users N 10 Mean size xon 1.7Mbits Mean idle time toff from 200ms to 1200ms Simulation time 300s Table: Simulation parameters t off (ms) 17/23 SimuTools Comparative study with ns-3 and Vienna

18 VI scenario Metrics of interest: - Average number of active users (Q) - Rejection probability of a call request (P r ) Both simulators are accurate with small relative errors and narrow confidence intervals Q ns-3 Q Vienna Q ns-3 Pr Vienna Pr theoretical P r Scheduler S simultaneous voice calls S 10 Mean call duration ton 1000ms Mean OFF period toff from 100ms to 150ms Simulation time 300s Table: Simulation parameters t off (ms) 18/23 SimuTools Comparative study with ns-3 and Vienna

19 VF scenario: first case (N > S) Metrics of interest: - Average number of active users (Q) - Rejection probability of a call request (P r ) Good accuracy: small relative errors and narrow confidence intervals 10 Q ns-3 Q Vienna Q ns-3 Pr Vienna Pr theoretical P r Scheduler S simultaneous voice calls S 10 Number of users N 15 Mean call duration ton 950ms Mean OFF period toff from 200ms to 1200ms Simulation time 300s Table: Simulation parameters t off (ms) 19/23 SimuTools Comparative study with ns-3 and Vienna

20 VF scenario: second case (N S) Metrics of interest: - Average number of active users (Q) Good accuracy 14 Q ns-3 Q Vienna Q theoretical Scheduler S simultaneous voice calls S 20 Number of users N 15 Mean call duration ton 950ms Mean OFF period toff from 200ms to 1200ms Simulation time 300s Table: Simulation parameters t off (ms) 20/23 SimuTools Comparative study with ns-3 and Vienna

21 Simulation run-time Finite source cases: - ns-3 much faster than Vienna - Vienna advances the time by TTI and performs more calculations than ns-3 Infinite source cases: - Vienna faster than ns-3 - ns-3 uses large number of users to model the infinite source (320) - Vienna creates and eliminates nodes during the simulation model VF DF VI DI ns-3 37min 27min 465min 608min Vienna 780min 390min 270min 300min Table: Run-time performance 21/23 SimuTools Comparative study with ns-3 and Vienna

22 Memory usage CPU occupation Memory: - Vienna uses 46 times more memory than ns-3 CPU: - ns-3 uses less resources than Vienna model VF DF VI DI ns-3 52MB 44MB 71MB 64MB Vienna 1.6GB 1.25GB 2.25GB 3GB Table: Memory usage model VF DF VI DI ns % 3.05% 3.1% 3.1% Vienna 8.1% 8% 7.5% 7.6% Table: CPU occupation 22/23 SimuTools Comparative study with ns-3 and Vienna

23 Conclusions In terms of accuracy, both simulators provide good results, for the four scenarios we tested. Regarding the execution time: - With finite number of sources ns-3 is clearly faster than Vienna. - Vienna becomes faster for infinite source scenarios. - In ns-3 we create at the beginning of the simulation a big number of UEs, whereas in Vienna, UEs can be created and deleted on-the-fly. In terms of CPU and memory usage, ns-3 is much better than Vienna. Concerning the ease of handling and use: - It depends on the skills of the programmer, in C++ or in MATLAB language. - We find that output traces are easier to manipulate in Vienna than in ns-3. - ns-3 is quite well documented which is not the case for Vienna. 23/23 SimuTools Comparative study with ns-3 and Vienna

Comparative study of LTE simulations with the ns-3 and the Vienna simulators

Comparative study of LTE simulations with the ns-3 and the Vienna simulators Comparative study of LTE simulations with the ns-3 and the Vienna simulators Thiago Abreu Université Pierre et Marie Curie - LIP 5005, Paris, France thiago.wanderley@lip.fr Tania Jiménez LIA/CERI University

More information

Performance Modeling

Performance Modeling Performance Modeling EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Sept 14, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Administrivia

More information

Models. Motivation Timing Diagrams Metrics Evaluation Techniques. TOC Models

Models. Motivation Timing Diagrams Metrics Evaluation Techniques. TOC Models Models Motivation Timing Diagrams Metrics Evaluation Techniques TOC Models Motivation Understanding Network Behavior Improving Protocols Verifying Correctness of Implementation Detecting Faults Choosing

More information

LTE multi-cellular system in urban environment: inter-cell interference Impact on the Downlink radio transmission

LTE multi-cellular system in urban environment: inter-cell interference Impact on the Downlink radio transmission LTE multi-cellular system in urban environment: inter-cell interference Impact on the Downlink radio transmission Younes BALBOUL Signals, Systems and Components Lab Faculty of Science and Technology, Fez,

More information

Network simulations and tools. Dmitry Petrov magister.fi or jyu.fi

Network simulations and tools. Dmitry Petrov magister.fi or jyu.fi Network simulations and tools Dmitry Petrov dmitry.petrov@ magister.fi or jyu.fi How may networks be studied? Measurements from real devices / networks Measurements from real devices Protocol analyzers,

More information

MODELING OF SMART GRID TRAFFICS USING NON- PREEMPTIVE PRIORITY QUEUES

MODELING OF SMART GRID TRAFFICS USING NON- PREEMPTIVE PRIORITY QUEUES MODELING OF SMART GRID TRAFFICS USING NON- PREEMPTIVE PRIORITY QUEUES Contents Smart Grid Model and Components. Future Smart grid components. Classification of Smart Grid Traffic. Brief explanation of

More information

Teletraffic theory (for beginners)

Teletraffic theory (for beginners) Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles

More information

An Approach to Addressing QoE for Effective Video Streaming

An Approach to Addressing QoE for Effective Video Streaming Pause Intensity An Approach to Addressing QoE for Effective Video Streaming Xiaohong Peng Electronic, Electrical and Power Engineering School of Engineering & Applied Science Aston University Birmingham,

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

Cover sheet for Assignment 3

Cover sheet for Assignment 3 Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach

More information

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing Husnu Saner Narman Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science University of Oklahoma,

More information

Optimal Packet Scheduling and Radio Resource Allocation. By Subhendu Batabyal Basabdatta Palit Prabhu chandar Dr. Suvra Sekhar Das

Optimal Packet Scheduling and Radio Resource Allocation. By Subhendu Batabyal Basabdatta Palit Prabhu chandar Dr. Suvra Sekhar Das Optimal Packet Scheduling and Radio Resource Allocation By Subhendu Batabyal Basabdatta Palit Prabhu chandar Dr. Suvra Sekhar Das Background - System Flow for Packet Scheduling Cellular Layout Tx Modulator

More information

Packet-oriented QoS management model for a wireless Access Point

Packet-oriented QoS management model for a wireless Access Point Packet-oriented QoS management model for a wireless Access Point draft-jobert-iccrg-ip-aware-ap-00.txt IETF 87, July 2013, Berlin Presenter: Philippe Cadro - philippe.cadro@orange.com Authors of the presentation:

More information

Time-Step Network Simulation

Time-Step Network Simulation Time-Step Network Simulation Andrzej Kochut Udaya Shankar University of Maryland, College Park Introduction Goal: Fast accurate performance evaluation tool for computer networks Handles general control

More information

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION CHAPTER 5 QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION 5.1 PRINCIPLE OF RRM The success of mobile communication systems and the need for better QoS, has led to the development of 3G mobile systems

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

LTE system performance optimization by RED based PDCP buffer management

LTE system performance optimization by RED based PDCP buffer management LTE system performance optimization by RED based PDCP buffer management Umar Toseef 1,2, Thushara Weerawardane 2, Andreas Timm-Giel 2, Carmelita Görg 1 1, University of Bremen, Bremen, Germany 2, TUHH,

More information

Application debugging USB Bus utilization graph

Application debugging USB Bus utilization graph Enabling Global Connectivity Computer Access Technology Corporation Tel: (408) 727-6600, Fax: (408) 727-6622 www.catc.com Application debugging USB Bus utilization graph Application Note Introduction The

More information

Load Balancing in Downlink LTE Self- Optimizing Networks

Load Balancing in Downlink LTE Self- Optimizing Networks FP7 ICT-SOCRATES Load Balancing in Downlink LTE Self- Optimizing Networks TD ()7 COST 2, th MCM Athens, Greece February 3 rd 5 th NSN, Wroclaw, Poland NSN, Munich, Germany TUBS, Braunschweig, Germany IBBT,

More information

An Extension of the ns-3 LTE Module to Simulate Fractional Frequency Reuse Algorithms

An Extension of the ns-3 LTE Module to Simulate Fractional Frequency Reuse Algorithms An Extension of the ns-3 LTE Module to Simulate Fractional Frequency Reuse Algorithms Piotr Gaw lowicz 1 Nicola Baldo 2 Marco Miozzo 2 1 AGH University of Science and Technology Kraków, Poland 2 Centre

More information

Queuing Networks. Renato Lo Cigno. Simulation and Performance Evaluation Queuing Networks - Renato Lo Cigno 1

Queuing Networks. Renato Lo Cigno. Simulation and Performance Evaluation Queuing Networks - Renato Lo Cigno 1 Queuing Networks Renato Lo Cigno Simulation and Performance Evaluation 2014-15 Queuing Networks - Renato Lo Cigno 1 Moving between Queues Queuing Networks - Renato Lo Cigno - Interconnecting Queues 2 Moving

More information

A Novel Scheduling and Queue Management Scheme for Multi-band Mobile Routers

A Novel Scheduling and Queue Management Scheme for Multi-band Mobile Routers A Novel Scheduling and Queue Management Scheme for Multi-band Mobile Routers Mohammed Atiquzzaman Md. Shohrab Hossain Husnu Saner Narman Telecommunications and Networking Research Lab The University of

More information

Model-based Measurements Of Network Loss

Model-based Measurements Of Network Loss Model-based Measurements Of Network Loss June 28, 2013 Mirja Kühlewind mirja.kuehlewind@ikr.uni-stuttgart.de Universität Stuttgart Institute of Communication Networks and Computer Engineering (IKR) Prof.

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Cell Broadcast Service USER DESCRIPTION

Cell Broadcast Service USER DESCRIPTION Cell Broadcast Service USER DESCRIPTION Copyright Copyright Ericsson AB 2008. All Rights Reserved. Disclaimer No part of this document may be reproduced in any form without the written permission of the

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

048866: Packet Switch Architectures

048866: Packet Switch Architectures 048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/

More information

Mesh Networks

Mesh Networks Institute of Computer Science Department of Distributed Systems Prof. Dr.-Ing. P. Tran-Gia Decentralized Bandwidth Management in IEEE 802.16 Mesh Networks www3.informatik.uni-wuerzburg.de Motivation IEEE

More information

Cisco Cooperative Project. Delay Performance and Different Locations for Users. Students: Li Li Advisors: Len Cimini, Chien-Chung Shen

Cisco Cooperative Project. Delay Performance and Different Locations for Users. Students: Li Li Advisors: Len Cimini, Chien-Chung Shen Cisco Cooperative Project Delay Performance and Different Locations for Users Students: Li Li Advisors: Len Cimini, Chien-Chung Shen Nov. 20, 2015 Outline Problem Review Performance of Delay Different

More information

Wireless Network Virtualization LTE case study

Wireless Network Virtualization LTE case study Wireless Network Virtualization LTE case study Yasir Zaki ComNets TZI University of Bremen, Germany April 23 rd, 2010 April 23, 2010 1 Outline Introduction to Wireless Virtualization State-of-the-art LTE

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

Customer Training Catalog Training Programs WCDMA RNP&RNO

Customer Training Catalog Training Programs WCDMA RNP&RNO Customer Catalog Programs WCDMA RNP&RNO HUAWEI Learning Service 2019 COMMERCIAL IN CONFIDENCE 1 CONTENTS 1 Solution... 3 1.1 WCDMA RNP&RNO Path... 3 1.2 Solution... 4 1.2.1 WCDMA Radio Network Planning

More information

Concept of a QoS aware Offer Planning for GPRS/EDGE Networks

Concept of a QoS aware Offer Planning for GPRS/EDGE Networks #150 1 Concept of a QoS aware Offer Planning for GPRS/EDGE Networks A. Kunz, S. Tcaciuc, M. Gonzalez, C. Ruland, V. Rapp Abstract A new era in wireless services has begun by introducing of packet oriented

More information

A Reinforcement Learning Based Intercell Interference Coordination in LTE Networks

A Reinforcement Learning Based Intercell Interference Coordination in LTE Networks future internet Article A Reinforcement Learning Based Intercell Interference Coordination in LTE Networks Djorwé Témoa 1, * ID, Anna Förster 2, * ID, Kolyang 3 and Serge Doka Yamigno 4 1 Department of

More information

End-to-End Mechanisms for QoS Support in Wireless Networks

End-to-End Mechanisms for QoS Support in Wireless Networks End-to-End Mechanisms for QoS Support in Wireless Networks R VS Torsten Braun joint work with Matthias Scheidegger, Marco Studer, Ruy de Oliveira Computer Networks and Distributed Systems Institute of

More information

Packet Switch Architectures Part 2

Packet Switch Architectures Part 2 Packet Switch Architectures Part Adopted from: Sigcomm 99 Tutorial, by Nick McKeown and Balaji Prabhakar, Stanford University Slides used with permission from authors. 999-000. All rights reserved by authors.

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

Discrete Event (time) Simulation

Discrete Event (time) Simulation Discrete Event (time) Simulation What is a simulation? Simulation is the process of designing a model of a real system and conducting experiments with this model for the purpose either of understanding

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Load Tester v11.2 Release Notes - Page 1 of 16 -

Load Tester v11.2 Release Notes - Page 1 of 16 - Load Tester v11.2 Release Notes - Page 1 of 16 - Version 11.2.0.5 Release Date: August 18, 2017 1. Dependent Tcl library version changed from 8.6 to 8.5 Resolved Issues Issue # Summary 11258 Load Tester

More information

Implementation of a leaky bucket module for simulations in NS-3

Implementation of a leaky bucket module for simulations in NS-3 Implementation of a leaky bucket module for simulations in NS-3 P. Baltzis 2, C. Bouras 1,2, K. Stamos 1,2,3, G. Zaoudis 1,2 1 Computer Technology Institute and Press Diophantus Patra, Greece 2 Computer

More information

Burst-mode Transceivers and Differentiated Classes of Service for PON. Dr. Monir Hossen ECE, KUET

Burst-mode Transceivers and Differentiated Classes of Service for PON. Dr. Monir Hossen ECE, KUET Burst-mode Transceivers and Differentiated Classes of Service for PON Dr. Monir Hossen ECE, KUET 1 Concept of Burst-mode Types of Burst-mode ONU Transmitter ~ ON/OFF with time slot fast ON/OFF is required

More information

IV. PACKET SWITCH ARCHITECTURES

IV. PACKET SWITCH ARCHITECTURES IV. PACKET SWITCH ARCHITECTURES (a) General Concept - as packet arrives at switch, destination (and possibly source) field in packet header is used as index into routing tables specifying next switch in

More information

Affects of Queuing Mechanisms on RTP Traffic Comparative Analysis of Jitter, End-to- End Delay and Packet Loss

Affects of Queuing Mechanisms on RTP Traffic Comparative Analysis of Jitter, End-to- End Delay and Packet Loss Comparative Analysis of Jitter, End-to- End Delay and Packet Loss Gregory Epiphaniou 1 Carsten Maple 1 Paul Sant 1 Matthew Reeves 2 1 Institute for Research in Applicable Computing University of Bedfordshire

More information

Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation

Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation Yunghsiang S. Han, Jing Deng and Zygmunt J. Haas Graduate Institute of Communication Engineering National Taipei University,

More information

X-TCP: a Cross Layer Approach for TCP Uplink Flows in mmwave Networks Laboratorio di Fondamenti di Informatica

X-TCP: a Cross Layer Approach for TCP Uplink Flows in mmwave Networks Laboratorio di Fondamenti di Informatica X-TCP: a Cross Layer Approach for TCP Uplink Flows in mmwave Networks Laboratorio di Fondamenti di Informatica Tommy Azzino, Matteo Drago, Michele Polese, Andrea Zanella, Michele Zorzi June 28, 2017 Dept.

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

CPRI FrontHaul requirements continuing discussion with TSN

CPRI FrontHaul requirements continuing discussion with TSN CPRI FrontHaul requirements continuing discussion with TSN Peter.AshwoodSmith@Huawei.com (presenter) Tao.Wan@Huawei.com (simulations) Nov 204 San Antonio, Texas Experimental Goal - ongoing To run the simplest

More information

QUEUING SYSTEM. Yetunde Folajimi, PhD

QUEUING SYSTEM. Yetunde Folajimi, PhD QUEUING SYSTEM Yetunde Folajimi, PhD Introduction What is a queue? A line of people or things waiting to be handled, usually in sequential order starting at the beginning or top of the line or sequence.

More information

Network Simulator Project Guidelines Introduction

Network Simulator Project Guidelines Introduction Network Simulator Project Guidelines Introduction Project TAs: Ruijia Sun (rsun@caltech.edu), Zilong Chen (zcchen@caltech.edu) During the CS143 course, you will learn about the mechanics of communication

More information

- Page 1 of 8 -

- Page 1 of 8 - LTE Load Tester v3.0 Release Notes - Page 1 of 8 - Introduction Polaris Networks LTE Load Tester is a test-tool to generate traffic load on an LTE EPC Node to measure and analyze the performance of the

More information

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012 Queuing Systems Queuing theory establishes a powerful tool in modeling and performance analysis of many complex systems, such as computer networks, telecommunication systems, call centers, manufacturing

More information

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017 CPSC 531: System Modeling and Simulation Carey Williamson Department of Computer Science University of Calgary Fall 2017 Recap: Simulation Model Taxonomy 2 Recap: DES Model Development How to develop a

More information

2. Traffic. Contents. Offered vs. carried traffic. Characterisation of carried traffic

2. Traffic. Contents. Offered vs. carried traffic. Characterisation of carried traffic Contents characterisation Telephone traffic modelling Data traffic modelling at packet level Data traffic modelling at flow level lect.ppt S-8.5 - Introduction to Teletraffic Theory Spring 6 Offered vs.

More information

Project Tutorial. CS 143 Communication Network. Ruijia Sun Zilong Chen. Based on version 2015, authored by Ritvik Mishra

Project Tutorial. CS 143 Communication Network. Ruijia Sun Zilong Chen. Based on version 2015, authored by Ritvik Mishra Project Tutorial CS 143 Communication Network Ruijia Sun Zilong Chen Based on version 2015, authored by Ritvik Mishra Outline Project Overview Requirements Network Components Design Remarks Tools Schedule

More information

TCP performance analysis through. processor sharing modeling

TCP performance analysis through. processor sharing modeling TCP performance analysis through processor sharing modeling Pasi Lassila a,b, Hans van den Berg a,c, Michel Mandjes a,d, and Rob Kooij c a Faculty of Mathematical Sciences, University of Twente b Networking

More information

Introduction to Operating Systems Prof. Chester Rebeiro Department of Computer Science and Engineering Indian Institute of Technology, Madras

Introduction to Operating Systems Prof. Chester Rebeiro Department of Computer Science and Engineering Indian Institute of Technology, Madras Introduction to Operating Systems Prof. Chester Rebeiro Department of Computer Science and Engineering Indian Institute of Technology, Madras Week 05 Lecture 18 CPU Scheduling Hello. In this lecture, we

More information

On Network Dimensioning Approach for the Internet

On Network Dimensioning Approach for the Internet On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/

More information

A Network Simulation Tool for User Traffic Modeling and Quality of Experience Analysis in a Hybrid Access Architecture

A Network Simulation Tool for User Traffic Modeling and Quality of Experience Analysis in a Hybrid Access Architecture A Network Simulation Tool for User Traffic Modeling and Quality of Experience Analysis in a Hybrid Access Architecture Oscar D. Ramos-Cantor, Technische Universität Darmstadt, oramos@nt.tu-darmstadt.de,

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Optimization of QoS in 4G Networks Using Handover Management

Optimization of QoS in 4G Networks Using Handover Management Optimization of QoS in 4G Networks Using Handover Management NAMRATA KATTI, SEEMA SHIVAPUR, VIJAYALAKSHMI M. Department of Computer Science BVBCET, Hubli namrata.katti1989@gmail.com, seems.laki@gmail.com,

More information

A queueing network model to study Proxy Cache Servers

A queueing network model to study Proxy Cache Servers Proceedings of the 7 th International Conference on Applied Informatics Eger, Hungary, January 28 31, 2007. Vol. 1. pp. 203 210. A queueing network model to study Proxy Cache Servers Tamás Bérczes, János

More information

Simulation Studies of the Basic Packet Routing Problem

Simulation Studies of the Basic Packet Routing Problem Simulation Studies of the Basic Packet Routing Problem Author: Elena Sirén 48314u Supervisor: Pasi Lassila February 6, 2001 1 Abstract In this paper the simulation of a basic packet routing problem using

More information

3. Examples. Contents. Classical model for telephone traffic (1) Classical model for telephone traffic (2)

3. Examples. Contents. Classical model for telephone traffic (1) Classical model for telephone traffic (2) Contents Model for telephone traffic Packet level model for data traffic Flow level model for elastic data traffic Flow level model for streaming data traffic lect03.ppt S-38.45 - Introduction to Teletraffic

More information

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS

Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter -5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS Chapter 5 QUALITY OF SERVICE (QOS) PLATFORM DESIGN FOR REAL TIME MULTIMEDIA APPLICATIONS 5.1 Introduction For successful

More information

2. Traffic lect02.ppt S Introduction to Teletraffic Theory Spring

2. Traffic lect02.ppt S Introduction to Teletraffic Theory Spring lect02.ppt S-38.145 - Introduction to Teletraffic Theory Spring 2005 1 Contents Traffic characterisation Telephone traffic modelling Data traffic modelling at packet level Data traffic modelling at flow

More information

estadium Project Lab 2: Iperf Command

estadium Project Lab 2: Iperf Command estadium Project Lab 2: Iperf Command Objectives Being familiar with the command iperf. In this Lab, we will set up two computers (PC1 and PC2) as an ad-hoc network and use the command iperf to measure

More information

Models. One Packet. Timing. Illustration. Examples UCB. Models EECS 122. P bits. Motivation Timing Diagrams Metrics Evaluation Techniques

Models. One Packet. Timing. Illustration. Examples UCB. Models EECS 122. P bits. Motivation Timing Diagrams Metrics Evaluation Techniques Motivation iming iagrams Metrics Evaluation echniques Motivation Understanding Network Behavior Improving Protocols Verifying Correctness of Implementation etecting Faults Choosing Provider Feasibility

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Streaming Video and TCP-Friendly Congestion Control

Streaming Video and TCP-Friendly Congestion Control Streaming Video and TCP-Friendly Congestion Control Sugih Jamin Department of EECS University of Michigan jamin@eecs.umich.edu Joint work with: Zhiheng Wang (UofM), Sujata Banerjee (HP Labs) Video Application

More information

5G Vision. Ali Khayrallah Ericsson Research San Jose, CA

5G Vision. Ali Khayrallah Ericsson Research San Jose, CA 5G Vision Ali Khayrallah Ericsson Research San Jose, CA Industry transformation Traditional Industries Digitalize & Mobilize Transformed Industries Operators & Network Devices Applications Ericsson 2015

More information

Simulation Study for a Broadband Multimedia VSAT Network

Simulation Study for a Broadband Multimedia VSAT Network Simulation Study for a Broadband Multimedia Yi Qian, Rose Hu, and Hosame Abu-Amara Nortel s 2201 Lakeside Blvd., Mail Stop 992-02-E70 Richardson, Texas 75082, USA Phone: 972-685-7264 Fax: 972-685-3463

More information

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)

CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)

More information

Fairness in the IEEE network. Shun Y. Cheung

Fairness in the IEEE network. Shun Y. Cheung Fairness in the IEEE 802.11 network Shun Y. Cheung Simple FIFO queueing High data rate flow Output queue (infinite size) Low data rate flow Packets from low data rate flow experience excessive queueing

More information

Pre-processor for MAC-layer Scheduler to Efficiently Manage Buffer in Modern Wireless Networks

Pre-processor for MAC-layer Scheduler to Efficiently Manage Buffer in Modern Wireless Networks Pre-processor for MAC-layer Scheduler to Efficiently Manage Buffer in Modern Wireless Networks Ankit Bhamri, Navid Nikaein, Florian Kaltenberger, Jyri Hämäläinen, Raymond Knopp Eurecom, France (email :

More information

Effect of Handover on the Performance of Scheduling Algorithms in LTE Networks

Effect of Handover on the Performance of Scheduling Algorithms in LTE Networks Effect of Handover on the Performance of Scheduling Algorithms in LTE Networks Narges Shojaedin University of Calgary nshojaed@ucalgary.ca Majid Ghaderi University of Calgary mghaderi@ucalgary.ca Ashwin

More information

The Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network

The Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network The Effect of Code-Multiplexing on the High Speed Downlink Packet Access (HSDPA) in a WCDMA Network Raymond Kwan, Peter H. J. Chong 2, Eeva Poutiainen, Mika Rinne Nokia Research Center, P.O. Box 47, FIN-45

More information

QoE-Driven Video Streaming and Video Content Caching

QoE-Driven Video Streaming and Video Content Caching CommNet2 & IcoreJoint Workshop on Content Caching & Distributed Storage for Future Communication Networks QoE-Driven Video Streaming and Video Content Caching Xiaohong Peng Adaptive Communications Networks

More information

An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes

An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes An Experimental Analysis on Iterative Block Ciphers and Their Effects on VoIP under Different Coding Schemes Gregory Epiphaniou 1 Carsten Maple 1 Paul Sant 1 Matthew Reeves 2 1 Institute for Research in

More information

EPON Scheduling Protocol Requirements

EPON Scheduling Protocol Requirements EPON Scheduling Protocol Requirements A system-level perspective Glen Kramer (kramer@cs.ucdavis.edu) Ryan Hirth (RHirth@terawave.com) Ed Boyd (ed.boyd@teknovus.com) Onn Haran (onn.haran@passave.com) Kent

More information

Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA

Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA Introduction to CDMA ALOHA 3. Access Control Techniques for CDMA ALOHA Takaya Yamazato Center for Information Media Studies, Nagoya University Nagoya 464-01, Japan yamazato@nuee.nagoya-u.ac.jp CDMA ALOHA

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go Chapter 3 Problem 2 In Figure 3.43 of the text every node transmits R bps, and we assume that both network partitions consist of 1 N nodes. So the total traffic generated by the nodes 2 of each Ethernet

More information

Title: Proposed modifications to Performance Testing Baseline: Throughput and Latency Metrics

Title: Proposed modifications to Performance Testing Baseline: Throughput and Latency Metrics 1 ATM Forum Document Number: ATM_Forum/97-0426. Title: Proposed modifications to Performance Testing Baseline: Throughput and Latency Metrics Abstract: This revised text of the baseline includes better

More information

Perspectives on Network Calculus No Free Lunch but Still Good Value

Perspectives on Network Calculus No Free Lunch but Still Good Value ACM Sigcomm 2012 Perspectives on Network Calculus No Free Lunch but Still Good Value Florin Ciucu T-Labs / TU Berlin Jens Schmitt TU Kaiserslautern Outline Network Calculus (NC): A Theory for System Performance

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

arxiv: v2 [cs.ni] 23 May 2016

arxiv: v2 [cs.ni] 23 May 2016 Simulation Results of User Behavior-Aware Scheduling Based on Time-Frequency Resource Conversion Hangguan Shan, Yani Zhang, Weihua Zhuang 2, Aiping Huang, and Zhaoyang Zhang College of Information Science

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction In a packet-switched network, packets are buffered when they cannot be processed or transmitted at the rate they arrive. There are three main reasons that a router, with generic

More information

Handover Aware Interference Management in LTE Small Cells Networks

Handover Aware Interference Management in LTE Small Cells Networks Handover Aware Interference Management in LTE Small Cells Networks Afef Feki, Veronique Capdevielle, Laurent Roullet Alcatel-Lucent Bell-Labs, France Email: {afef.feki,veronique.capdevielle,laurent.roullet}@alcatel-lucent.com

More information

Large-Scale Network Simulation Scalability and an FPGA-based Network Simulator

Large-Scale Network Simulation Scalability and an FPGA-based Network Simulator Large-Scale Network Simulation Scalability and an FPGA-based Network Simulator Stanley Bak Abstract Network algorithms are deployed on large networks, and proper algorithm evaluation is necessary to avoid

More information

Statistical Analysis of Output from Terminating Simulations

Statistical Analysis of Output from Terminating Simulations Statistical Analysis of Output from Terminating Simulations Statistical Analysis of Output from Terminating Simulations Time frame of simulations Strategy for data collection and analysis Confidence intervals

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet

More information

Mobile Communications Chapter 7: Wireless LANs

Mobile Communications Chapter 7: Wireless LANs Characteristics IEEE 802.11 PHY MAC Roaming IEEE 802.11a, b, g, e HIPERLAN Bluetooth Comparisons Prof. Dr.-Ing. Jochen Schiller, http://www.jochenschiller.de/ MC SS02 7.1 Comparison: infrastructure vs.

More information

A closer look at network structure:

A closer look at network structure: T1: Introduction 1.1 What is computer network? Examples of computer network The Internet Network structure: edge and core 1.2 Why computer networks 1.3 The way networks work 1.4 Performance metrics: Delay,

More information

Key aspects of cloud computing. Towards fuller utilization. Two main sources of resource demand. Cluster Scheduling

Key aspects of cloud computing. Towards fuller utilization. Two main sources of resource demand. Cluster Scheduling Key aspects of cloud computing Cluster Scheduling 1. Illusion of infinite computing resources available on demand, eliminating need for up-front provisioning. The elimination of an up-front commitment

More information

Coexistence Guidelines for LTE in Unlicensed Spectrum Studies

Coexistence Guidelines for LTE in Unlicensed Spectrum Studies Coexistence Guidelines for LTE in Unlicensed Spectrum Studies Version 1.0 WI-FI ALLIANCE PROPRIETARY SUBJECT TO CHANGE WITHOUT NOTICE This document may be used with the permission of Wi-Fi Alliance under

More information