Estimation of the Effects of non-in Traffic on IN Service Control Point Congestion Control Performance

Size: px
Start display at page:

Download "Estimation of the Effects of non-in Traffic on IN Service Control Point Congestion Control Performance"

Transcription

1 SCHOOL OF ELECTRONIC ENGINEERING Internal Technical Report Estimation of the Effects of non-in Traffic on IN Service Control Point Congestion Control Performance F. Lodge, T. Curran. Dublin City University, Ireland. 17th. November, Abstract This paper describes a simulation of an Intelligent Network (IN) which reflects the actual physical architecture of the network and models the information flows required between network entities in order to execute various IN services. An effective congestion control strategy is implemented with a suitable detection method at the Service Control Point (SCP) and Automatic Code Gapping (ACG) as a throttle mechanism in the Service Switching Points (SSPs). Non-IN traffic is then introduced to the network and the effects of this extra load at the switches on the performance of the congestion control strategy is estimated using SCP queue length, SCP throughput and user response delays as the relevant criteria. 1. Introduction The concept of the Intelligent Network was developed in order to allow users to create and maintain services quickly and easily and to provide all authorised users in the network with the ability to access any of the offered services. This objective is met through the creation of a

2 Service Control Point (SCP) - a point in the network where all service software resides and with which all Physical Entities (PEs) in the network may communicate in order to provide the required functionality. However, the architecture of the network is such that, to execute even the simplest service, many messages must be transmitted between PEs over the Signalling System Number 7 (SS7) network, resulting in large quantities of traffic. Although much research has gone into the areas of congestion and congestion control in switching systems, these issues have not yet been addressed in the field of IN. This paper focusses on the congestion which would inevitably result from all the interactions required to implement IN services. As in the general case, the aims in the development of an efficient congestion control strategy in the IN would be to successfully complete as many service requests for as many users as possible, while keeping response delays as low as possible. In this paper, an IN is simulated with service software for the televoting, freephone and callback services resident at the SCP. Three congestion control techniques are investigated to find which provides the optimal protection of the SCP while maximising SCP throughput and minimising the average response time of the system to the user. Finally, the performance of the selected control strategy is tested under realistic traffic loads with the SSPs in the network being subjected to a high traffic load of mixed IN and non-in call requests, with IN requests comprising only 35% of arriving calls. This emulates the actual load mix which would exist in a real IN, and therefore provides an accurate and realistic impression of the quality of the congestion control strategy. 1.1 The Intelligent Network The IN may exist either as an overlay to a telephone network (PSTN / ISDN etc.) in which case, all service requests are routed over the phone network to the SSP of the IN, or as part of the phone network, with SSP functionality installed in the telephone switches. In either case, the structure and operation of the IN is the same. The basic physical elements comprising the IN are: The Service Switching Point (SSP) - user access to service functionality is provided through the SSP, which handles call processing, detects service requests and provides connectivity to the SCP and other SSPs in the network. The SSP contains three discrete functions. The Call Control Agent Function (CCAF) provides user connectivity to the Call Control Function (CCF) which controls the progression of all calls. The CCF is responsible for handling both IN service requests and non-in calls. The CCF manages the setup, maintenance and teardown of non-in calls, and when it detects any service requests, it initiates service execution by passing control of the call to the SCP via the Service Switching Function (SSF). The SSF builds all messages for the SCP and interprets all commands received from there. The Service Control Point (SCP) - the Service Control Function (SCF) resides here and controls the execution of all service software, including the transmission of messages to the network database and Intelligent Peripherals and the interpretation of results from the same. The Service Data Point (SDP) - this is connected directly to the SCP and contains all network data relevant to the execution of services. The Service Data Function (SDF)

3 interprets SCF-generated requests, accesses data in the database and sends results back to the SCF. The Intelligent Peripheral (IP) - the IP is connected to the SSP and provides the functionality for interactions between the network and users i.e. the reading of announcements, collection of digits typed in by the user etc.. The Service Resource Function (SRF) resides here. All communications between SSPs and SCPs and between SCPs and IPs occur over an SS7 network using the TCAP part of the protocol. The PEs and their interconnections are shown in Figure 1 below. SCP SCF SDF SDP SS7 Network Signalling Channel SSF SSP CCAF CCF Other SSPs Transport Channel SRF IP Figure 1: Architecture of the Intelligent Network 1.2 Congestion Control Much research has been carried out in the area of congestion control with a large number of strategies being investigated and compared. Any congestion control strategy may be divided into two distinct parts - the detection method and the throttle mechanism. The detection method describes how overload situations are recognised and, when overload is detected, the throttle mechanism is put in place to counteract the problem. The principle detection methods which have been investigated for use in switching systems are Queue Length Control, Load Measure Control and Call Count Control (and variations thereof), the results of which were that, in general, Call Count Control proved to be the most effective (see [4]) at protecting a switch. However, the IN is a much more complex system containing multiple elements which must interact to provide the functionality of the system. The SCP is at the core of the network and must be protected at all costs, but due to the distributed nature of the functionality in the network, it cannot be assumed that results attributable to the above detection methods in a discrete switching system also apply in the realm of the IN. Therefore, it proves necessary to evaluate the usefulness of using both Queue Length and Call Count Controls at the SCP. Another method - Response Time

4 Control - was developed specifically for implementation in the IN and was also investigated in the model. As SCP processing time should be optimised in the execution of services, it would be wasteful to spend time rejecting calls here. Also, in general in congestion control, it is desirable to kill unwanted calls as near to the source as possible. Therefore, the throttle mechanism associated with the control strategy should be located in the SSPs of the IN. Some investigation has already been carried out on throttle mechanisms in the IN (see [1] and [2]) and the Automatic Code Gapping (ACG) throttle consistently provides the highest level of protection to the SCP and is therefore implemented in the simulation model. The operation of the ACG mechanism will be described in Section Modelling the IN The IN simulation was developed using OPNET (OPtimised Network Engineering Tools). Each PE was modelled as a queueing node which contained the required functionality. In order to describe how the system was designed, it is first necessary to show the interactions required between PEs to execute a service. 2.1 Decomposition of Services The best method of describing how a service decomposes into actions at PEs and information flows between PEs is to provide a simple example. Therefore, the breakdown of the interaction requirements for a simple Televoting service as implemented in the simulation is as follows: User Requests Televoting Service SSF/CCF SCF SRF SDF Analysed Info Connect to Resource Prompt and Collect User Info Collected User Info Update Data Update Confirmation Disconnect Fwd Connection Play Announcement Figure 2: Decomposition of Televoting Service

5 User goes offhook and dials the televoting number, The digits typed in by the user are collected and examined by the CCF, A service request is recognised by the CCF and call processing is suspended, The SSF builds an Analysed_Info message containing the dialled digits and sends it to the SCF via the SS7, The SCF creates a new instance of the Televoting Service Logic Program (SLP), The SLP Instance (SLPI) sends a message to the SSF requesting that a channel be opened between the user and the SRF, The SLPI sends a message to the SRF requesting that the relevant announcement be read and the digits keyed in by the user in response be collected, The SRF collects the resulting digits and passes them back to the SCF, The SCF sends a message to the SDF in order to update the televoting statistics, The SDF sends an acknowledgement, The SCF requests the SRF to play an acknowledgement announcement to the user, The SCF tells the SSF to disconnect the SRF from the user and to end the call. The SLPI then terminates. The SSF transfers the SCF's instructions to the CCF, which then terminates call processing. The information flows between functional entities as described above are shown in Figure 2. The other services implemented were decomposed into information flows in a similar manner. The information flow details from the SCP to other PEs may be summarised as shown in Table 1. Note that, for both freephone and callback services, service logic execution completion results in the establishment of a non-in call. Table 1: SCP Interactions Service IP Requests SDP Requests Freephone - 1 Callback 2 2 Televoting The Simulation Model The simulation model consists of one SCP, one SDP and two SSPs connected together as shown in Figure 3. The SCP is made up of four queues - one First-in-first-out (FIFO) queue acting as the central controller while each service logic program is represented by another queue which contains the required routing information for the service. The central controller is responsible for implementing the detection routines. The SDP is connected directly to the SCP and simply comprises one FIFO queue. An IP is integrated with each SSP - every IP request begins with a request to an SSP to open a channel between the IP and the user, before instructions are sent to the IP. Therefore, giving the SSP control over SRF execution simplifies the model without affecting the sequence of events involved in service processing. The SSP is made up of a number of queues - one each to represent the functionality of the CCF (FIFO), the SSF (FIFO with two subqueues - the first subqueue accepts all new call requests and the second is for service calls which have completed processing and require the establishment of a non-in call. The second subqueue is served with a higher priority than the

6 new calls in the first subqueue.) and the SRF (Erlang-C). Also included in the SSP is a bank of queues to deal with the exchange of messages between SSPs for dealing with non-in calls. SCP SDP SSF SSF SRF CCF non-in messages CCF SRF Generators Figure 3: The Simulation Model Each SSP also contains four ideal Poisson generators. Each generator creates requests of a particular type - namely freephone requests, callback requests, televoting requests and non-in calls. The operation of the SS7 network which, in reality, would be responsible for handling communications between PEs is not addressed in the model - modelling delays in the SS7 is a very complex task and was perceived to be outside the scope of this investigation. Therefore, all PEs are connected directly to each other, as shown in the diagram, and transmission delays are assumed to be negligible. 2.3 Measurement of User Delays User delays were measured by summing the delays for each request at each node on the route through the network in order to find the total delay for each request and calculating the average over all requests for each service type. However, the IP is implemented as an Erlang C model with the service time representing the time in service execution when the network is interacting with the user i.e. the user has received a response from the network even though the service has not yet completed. Therefore, the delay at the IP is discounted from the overall service delay. Note, therefore, that in services which require user interaction, the delays may appear quite high (to the order of 1-2 seconds), but the user has received a response from the network during that period.

7 3 Investigation of Congestion Control Strategies 3.1 Effects of Congestion on the IN Initially, the arrival rate of the non-in generator was set to zero, so that all traffic arriving at the SSPs was service related. The service request generators were set to ensure a steady load on the SCP and a good service traffic mix. The average delays to the user were initially measured under optimal network conditions i.e. the queue lengths at all nodes were at a steady state value and the system was processing as many requests as possible without becoming congested. These delays were thereafter used as the ideal network response times for comparison purposes. Once the ideal parameters for delay were established, the effects of an overload on the SCP were investigated by increasing the input traffic generated by the televoting generator. The effects of this overload on SCP queue lengths and average user delays was dramatic as shown in Figures 4a and 4b below. Figure 4a: Effects of Congestion on SCP Queue Length

8 Figure 4b: Effects of Congestion on User Delays 3.2 IN Congestion Control Strategies The next step was to put congestion control mechanisms in place. The performance of three detection methods was investigated by implementing them at the SCP and judging their effectiveness relative to SCP queue length, user response and throughput. The detection methods investigated were: Queue Length Control (QLC), which involves monitoring the queue length at the SCP and signifying an overload when a predefined maximum length is exceeded. Call Count Control (CCC), which is implemented at the input of the SCP and counts the number of new service requests arriving at the SCP within successive time intervals and signifies an overload when a previously specified maximum limit is exceeded. CCC may, if desired, be refined further to count the arrivals of each service separately, so that if an overload occurs on one service only, the SCP will recognise this and can specify that a throttle should be placed on the congested service only. This would improve the fairness of the congestion control strategy. Response Time Control (RTC), in which the average delay in responding to a user request is monitored over a predetermined interval and, when the permissible limit is exceeded, the existence of an overload is notified. The RTC algorithm is implemented at the output queue of the SCP. The measured delay includes delays at the SCP, IP, SDP and SSP. Therefore, this detection method has an advantage over CCC in that if the IP or SDP becomes overloaded, this will register in the SCP, as the total delays of requests will be effected by the delays at these PEs. On the other hand, as the response time for each service type varies according to the requirements which the service places on the system, the average delay must be measured separately for each service request type, which makes RTC more complex to implement that CCC. However, this complexity also means that extending the control strategy so that it can throttle only one service is a very simple task. For all detection methods, the level of overload is derived from the amount by which the boundary level is exceeded. In the simulation, six overload levels are defined at the SCP. For each level, a gap interval value is specified. At the end of the monitoring period within the SCP, if an overload is detected at the SCP, its severity is estimated and an overload level assigned. An ACG request is formulated and transmitted to the SSP. These request contains a

9 gap duration (length of time for which ACG is to be executed) level and a gap interval (interval for which all queries to the SCP should be blocked after each accepted call) level selected by the SCP. Call Accepted Calls Rejected Gap Interval Gap Duration Figure 5: The ACG Throttle Mechanism When the SSP receives the ACG request, the gap interval time and gap duration associated with the overload level are evaluated and timers are initialised for each. The next service request to arrive will be accepted and the interval timer set. Until this timer expires, all further arriving calls will be unconditionally blocked. After the gap interval has elapsed, the first call to arrive is accepted and serviced and the gap interval timer is reinitialised. This call restricting procedure continues until the gap duration has expired [3]. Once the relevant controls were put in place in the model, the effects of QLC, CCC and RTC on network operation were evaluated for various severities of overload and with various traffic mixes. The average user delay for each service type and the number of rejected calls (as a percentage of total offered traffic) were monitored for each control type. The results will be presented in the next section. 3.3 Congestion Results When the network was subjected to a traffic load which was, on average, below congestion levels, but was prone to bursts of heavy traffic, QLC was found to be superior to both CCC and QLC in dealing with the problem. This is due to the fact that QLC is a dynamic detection method, and responds instantaneously to any sudden increases in traffic load by rejecting the calls which cause overload. On the other hand, both CCC and RTC monitor traffic over a time interval, so that, by the time the overload has been detected, the calls which caused the overload have already been accepted by the SCP and it therefore takes both longer to deal with the overload situation and causes an unnecessarily high number of calls to be rejected. However, when the network was supplied with consistently high traffic loads, it was found that [5] CCC and RTC both were far superior to QLC as, under heavy loads, QLC rejected high proportions of offered traffic, without ever reducing the overload situation. Therefore, all further comparisons of results under consistently heavy overload conditions will be carried out between RTC and CCC only. On analysis of the graphical results of the simulations (see Figure 6 for service delays and Table 2 for the percentage of calls rejected), it may be seen that RTC is consistently more

10 effective at reducing user delays during congestion situations. On the other hand, as CCC takes place at the input to the SCP while RTC occurs at the output, CCC responds faster to the onset of congestion - an increase in offered traffic is detected almost immediately and a throttle put in place. For RTC, the SCP is already congested by the time detection occurs and more extreme control measures must be taken in order to deal with the situation. Therefore, when periods of congestion occur sporadically, more calls are rejected when using RTC than when using CCC. At higher overload levels, when the number of offered calls to the SCP is consistently too high, so that a throttle must be constantly maintained, the speed at which the system reacts to the onset of congestion is no longer an issue and both strategies are seen to result in the same percentage of rejected calls. Figure 6: Average User Delays Under Congestion Table 2: Rejected Calls (as %age of Total Offered) \ SCP Load Strategy \ Call Count Control 7% 23% 57% Response Time Control 18% 36% 57% It may therefore be concluded that while RTC is better at protecting network elements from the detrimental effects of congestion, it is slow to respond to bursts of high traffic. CCC, while not as effective as RTC at reducing delays, still provides good results and copes very well with instances of high bursty traffic. Therefore, CCC was chosen as the being consistently the best detection method for protecting the SCP from overload. The effects of CCC on traffic levels of 1.0, 1.2 and 1.33 times the maximum acceptable load levels are shown in Figures 7a and 7b below. Figure 7a shows the mean SCP queue length for each overload level, while Figure 7b shows the average user delays for the televoting and freephone services for each overload level.

11 Figure 7a: SCP Queue Lengths Under Various Overload Conditions Figure 7b: Service Delays Under Various Overload Conditions A comparison between the ideal throughput for any control scheme and the actual throughput for CCC is shown in Figure 8 below. As can be seen in the graph, the results given by CCC are quite close to the ideal. It may therefore be concluded that CCC is very effective at maximising SCP throughput while protecting it from being congested.

12 Figure 8: Network Throughput under Congestion Control 4. Estimation of the Effects of non-in Traffic on Congestion Control Performance The final step involves the introduction of non-in calls into the network and the estimation of their affect on network performance. The generators in both SSPs were set so that the traffic ratio of non-in calls to service requests was 65:35, as would be the case in a real telephone network. The effects of these calls on the SCP queue length and service delays was monitored at overload levels of 1.0, 1.2 and 1.33 times maximum acceptable service load. The results may be seen in Figures 9a and 9b, where 9a shows the delay for users of the televoting and freephone services with and without non-in calls and 9b shows the variation in mean SCP queue length caused by the introduction of non-in calls.

13 Figure 9a: Service Delays with and without non-in Calls Figure 9b: SCP Queue Length with and without non-in Calls Note that when non-in calls are introduced to the system, the initial results seem superior to the case when all calls are service related. SCP queue length is lower as are the service delays. However, as time progresses, the situation worsens until eventually, the SCP queue lengths and the service delays are longer than when no non-in calls were present. The reasons for this are as follows. When the simulation begins, the number of non-in calls arriving at the SSPs is considerably greater than the number of service requests but the time required to process the calls is the same. Therefore, all service related calls are delayed by the presence of the non-in calls in the queue. This means that initially the SCP queue length is maintained quite low. In other words, the non-in calls in the SSPs act as a delaying buffer to the SCP. This affects the service delays in that, as the SCP queue length is low, both new arrivals and responses from the SDP and IP do not have to wait as long for service by the SCP processor and the overall delays experienced by the requests is lower. However, as time passes, the buffering effect of the non-in calls diminishes and the SCP queue length rises which in turn causes the service delays to increase accordingly. Therefore, in the long term, once the initial beneficial effects of introducing non-in calls into the network have vanished, the performance of the CCC strategy at the SCP is detrimentally affected, with SCP queue lengths and service delays longer than those which existed when only service related calls

14 were being handled. However, the CCC strategy is not affected by the non-in calls in that it remains consistently effective at ensuring the maximum possible throughput at the SCP. 6. Conclusions There are a number of conclusions which may be drawn about the results as discovered in the model. The first, and most obvious, is that it is vital to take into account the effects of non- IN traffic at the SSPs when investigating the performance of congestion control strategies at protecting the SCP while minimising user delays. CCC seems to be the best detection method for protecting the SCP when the network is subjected to service related calls only, as it rejects fewer calls than RTC while providing user delays which are only slightly greater than RTC. However, when non-in calls are introduced, the result is a small but significant increase in user delays. This would imply that the best possible strategy for controlling congestion in the IN would combine the advantages of CCC - speed of response and maximum possible throughput under overload conditions - with the advantages of RTC, which minimises the delays at the SCP, SDP and IPs (thus ensuring that they do not individually become overloaded) so that the lowest possible user delays can be offered. It is therefore recommended that future research in the area of IN congestion control should focus on developing a strategy which uses CCC in conjunction with RTC in order to maximise service handling capabilities while maintaining user delays as low as possible. References [1] N. Tsolas, G. Abdo and R. Bottheim, "Performance and Overload Considerations when Introducing IN into an Existing Network", ITC-13, North Holland, 1991, pp [2] X. H. Pham, "Congestion Control for Intelligent Networks", Computer Networks and ISDN Systems, Volume 26, No. 5, January [3] Bellcore, "Advanced Intelligent Network (AIN) 0.1 Switching Systems Generic Requirements", August [4] U. Korner, "Overload Control of SPC Systems", International Zurich Seminar on Digital Communications - Intelligent Networks and Their Applications, March [5] F. Lodge, T. Curran, M. Gulyani, A. Newcombe, "Intelligent Network Congestion Control Strategies and their Impact on User-Level Quality of Service", Proceedings of the Australian Telecommunication Networks & Applications Conference, Melbourne, December 1994.

Intelligent Network -IN - IN

Intelligent Network -IN -  IN Intelligent Network IN www.comnets.unibremen.de IN 11 1 Intelligent Networks Intelligent Networks are a method of delivering switched telecommunications services such as Freephone, Virtual Private Networks

More information

Introduction. Performance Evaluation of IN based Mobility Management. Marcos Bafutto Telecommunicações Brasileiras S.A. - Telebrás

Introduction. Performance Evaluation of IN based Mobility Management. Marcos Bafutto Telecommunicações Brasileiras S.A. - Telebrás Copyright Notice c 996 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works

More information

The International Intelligent Network (IN)

The International Intelligent Network (IN) The International Intelligent Network (IN) Definition In an intelligent network (IN), the logic for controlling telecommunications services migrates from traditional switching points to computer-based,

More information

Mobile Intelligent Network

Mobile Intelligent Network E1-E2 UPGRADATION COURSE CONSUMER MOBILITY Mobile Intelligent Network Page: 1 Chapter Five Mobile Intelligent Network Intelligent Network: IN is an architectural concept for the operation and provision

More information

Performance analysis and modelling of an OSA gateway

Performance analysis and modelling of an OSA gateway Performance analysis and modelling of an OSA gateway Andersson, Jens K; Nyberg, Christian; Kihl, Maria Published in: Personal Wireless Communications / Lecture Notes in Computer Science Published: 23-1-1

More information

INSE 7110 Winter 2004 Value Added Services Engineering in Next Generation Networks Week #1. Roch H. Glitho- Ericsson/Concordia University

INSE 7110 Winter 2004 Value Added Services Engineering in Next Generation Networks Week #1. Roch H. Glitho- Ericsson/Concordia University INSE 7110 Winter 2004 Value Added Services Engineering in Next Generation Networks Week #1 1 Outline 1. Essentials of circuit switched telephony 2. Introduction to value added services 3. IN fundamental

More information

SPECIFIC AIN 0.0 SS7 TCAP PROTOCOL

SPECIFIC AIN 0.0 SS7 TCAP PROTOCOL Interface Document April 1996 SPECIFIC AIN 0.0 SS7 TCAP PROTOCOL Network-to-Network Interface This document cannot be reproduced without the express permission of Stentor Resource Centre Inc. Any reproduction,

More information

Performance analyzer for Intelligent Network

Performance analyzer for Intelligent Network Performance analyzer for Intelligent Network 7 Jorrna Jormakka Communications Laboratory Helsinki University oftechnology Otakaari 5, 02150 Espoo, Finland E-mail: Jorma.Jormakka@hut.fi tel. 358-0-4512360,

More information

Performance analysis and overload control of an open service access (OSA) architecture

Performance analysis and overload control of an open service access (OSA) architecture Performance analysis and overload control of an open service access (OSA) architecture Jens K. Andersson *, Christian Nyberg and Maria Kihl Department of Communication Systems, Lund Institute of Technology

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. Lecture 21 Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. 7 http://money.cnn.com/2011/11/07/technology/juniper_internet_outage/

More information

EN V1.1.1 ( )

EN V1.1.1 ( ) European Standard (Telecommunications series) Integrated Services Digital Network (ISDN); Completion of Calls on No Reply (CCNR) supplementary service; Service description 2 Reference DEN/NA-010027 (ai000ico.pdf)

More information

TELECOMMUNICATION SYSTEMS

TELECOMMUNICATION SYSTEMS TELECOMMUNICATION SYSTEMS By Syed Bakhtawar Shah Abid Lecturer in Computer Science 1 Signaling System 7 Architecture Signaling System 7 Protocol Stacks Overview Level 1: Physical Connection SS7 Level 2:

More information

Learning Outcomes. Scheduling. Is scheduling important? What is Scheduling? Application Behaviour. Is scheduling important?

Learning Outcomes. Scheduling. Is scheduling important? What is Scheduling? Application Behaviour. Is scheduling important? Learning Outcomes Scheduling Understand the role of the scheduler, and how its behaviour influences the performance of the system. Know the difference between I/O-bound and CPU-bound tasks, and how they

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

Unit 3 : Process Management

Unit 3 : Process Management Unit : Process Management Processes are the most widely used units of computation in programming and systems, although object and threads are becoming more prominent in contemporary systems. Process management

More information

Process- Concept &Process Scheduling OPERATING SYSTEMS

Process- Concept &Process Scheduling OPERATING SYSTEMS OPERATING SYSTEMS Prescribed Text Book Operating System Principles, Seventh Edition By Abraham Silberschatz, Peter Baer Galvin and Greg Gagne PROCESS MANAGEMENT Current day computer systems allow multiple

More information

NMCS2 MIDAS Outstation Algorithm Specification

NMCS2 MIDAS Outstation Algorithm Specification traffic systems and signing TR 2177 Issue H NMCS2 MIDAS Outstation Algorithm Specification Crown Copyright 2009 First published 1994 Printed and published by the Highways Agency Page 1 NOTE: This document

More information

A network approach to signalling network congestion control

A network approach to signalling network congestion control A network approach to signalling network congestion control Lars Angelin, Stefan Pettersson, and Åke Arvidsson e-mail: larsa@itk.hk-r.se, stefanp@itk.hk-r.se, aker@itk.hk-r.se Dep. of telecommunications

More information

Robust Multi-class Signaling Overload Control for. Wireless Switches

Robust Multi-class Signaling Overload Control for. Wireless Switches Robust Multi-class Signaling Overload Control for Wireless Switches J. Pinheiro C. Loader, T. LaPorta, S. Kasera, M. Karaul, A. Hari 1 Novartis Pharmaceuticals jose.pinheiro@pharma.novartis.com Bell Labs

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

Quality of Service in Telecommunication Networks

Quality of Service in Telecommunication Networks Quality of Service in Telecommunication Networks Åke Arvidsson, Ph.D. Ericsson Core Network Development, Sweden Main Message Traffic theory: QoS is (partly) about congestion. Congestion is partly caused

More information

INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 12 DELAYED CONTRIBUTION 95. Behaviour of data modems in lossy, packet-based transport systems

INTERNATIONAL TELECOMMUNICATION UNION STUDY GROUP 12 DELAYED CONTRIBUTION 95. Behaviour of data modems in lossy, packet-based transport systems INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 2005-2008 English only Original: English Questions: 11, 13/12 Geneva, 17-21 October 2005 Source: Title: STUDY

More information

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION CCITT E.412 THE INTERNATIONAL TELEGRAPH AND TELEPHONE CONSULTATIVE COMMITTEE (11/1988) SERIES E: OVERALL NETWORK OPERATION, TELEPHONE SERVICE, SERVICE OPERATION AND

More information

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network This Lecture BUS0 - Computer Facilities Network Management Switching networks Circuit switching Packet switching gram approach Virtual circuit approach Routing in switching networks Faculty of Information

More information

Analysis of Variation in IEEE802.11k Channel Load Measurements for Neighbouring WLAN Systems

Analysis of Variation in IEEE802.11k Channel Load Measurements for Neighbouring WLAN Systems Analysis of Variation in IEEE802.11k Channel Load Measurements for Neighbouring WLAN Systems Christina THORPE 1, Sean MURPHY, Liam MURPHY School of Computer Science and Informatics, University College

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

ETSI TCR-TR 008 TECHNICAL COMMITTEE August 1993 REFERENCE TECHNICAL REPORT

ETSI TCR-TR 008 TECHNICAL COMMITTEE August 1993 REFERENCE TECHNICAL REPORT ETSI TCR-TR 008 TECHNICAL COMMITTEE August 1993 REFERENCE TECHNICAL REPORT Source: ETSI TC-NA Reference: DTR/NA-043203 ICS: 33.080 Key words: TMN, Vocabulary Network Aspects (NA); Network architecture,

More information

SELECTION OF METRICS (CONT) Gaia Maselli

SELECTION OF METRICS (CONT) Gaia Maselli SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

TKN. Technische Universität Berlin. Circuit Switching Module for ns-2. Filip Idzikowski. Berlin, March 2009

TKN. Technische Universität Berlin. Circuit Switching Module for ns-2. Filip Idzikowski. Berlin, March 2009 TKN Telecommunication Networks Group Technische Universität Berlin Telecommunication Networks Group Circuit Switching Module for ns-2 Filip Idzikowski idzikowski@tkn.tu-berlin.de Berlin, March 2009 TKN

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

General comments on candidates' performance

General comments on candidates' performance BCS THE CHARTERED INSTITUTE FOR IT BCS Higher Education Qualifications BCS Level 5 Diploma in IT April 2018 Sitting EXAMINERS' REPORT Computer Networks General comments on candidates' performance For the

More information

McArdle, Conor; Widell, Niklas; Nyberg, Christian; Lilja, Erik; Nyström, Jenny; Curran, Tommy

McArdle, Conor; Widell, Niklas; Nyberg, Christian; Lilja, Erik; Nyström, Jenny; Curran, Tommy Simulation of a distributed CORBA-based SCP McArdle, Conor; Widell, Niklas; Nyberg, Christian; Lilja, Erik; Nyström, Jenny; Curran, Tommy Published in: Telecommunications and IT convergence : towards service

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

DigiPoints Series Volume 1. Leader Guide. Module 9 Network Architectures

DigiPoints Series Volume 1. Leader Guide. Module 9 Network Architectures Network Architectures Page 9.i DigiPoints Series Volume 1 Module 9 Network Architectures Summary This module describes the two primary arrangements by which signals are carried from one location to another:

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION ITU-T E.411 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2000) SERIES E: OVERALL NETWORK OPERATION, TELEPHONE SERVICE, SERVICE OPERATION AND HUMAN FACTORS Quality

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information

Chapter 13: I/O Systems

Chapter 13: I/O Systems Chapter 13: I/O Systems Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations Streams Performance 13.2 Silberschatz, Galvin

More information

V9 Assurance Administrators Guide DOCUMENTATION. Phone: Fax:

V9 Assurance Administrators Guide DOCUMENTATION. Phone: Fax: V9 Assurance Administrators Guide DOCUMENTATION Phone: 01981 590410 Fax: 01981 590411 E-mail: information@praceng.com CHANGE HISTORY ORIGINAL DOCUMENT AUTHOR: MICHELLE HARRIS DATE: JAN 2010 AUTHOR DATE

More information

Ch 4 : CPU scheduling

Ch 4 : CPU scheduling Ch 4 : CPU scheduling It's the basis of multiprogramming operating systems. By switching the CPU among processes, the operating system can make the computer more productive In a single-processor system,

More information

The BANDIT can also concentrate and switch multiple sources of Frame Relay traffic simultaneously.

The BANDIT can also concentrate and switch multiple sources of Frame Relay traffic simultaneously. encor! enetworks TM Version A, March 2008 2013 Encore Networks, Inc. All rights reserved. Routing with Frame Relay This chapter discusses Frame Relay routing. 4.1 Frame Relay You can configure use of synchronous

More information

Advanced Intelligent Network for Wireless Communications

Advanced Intelligent Network for Wireless Communications www..org Advanced Intelligent Network for Wireless Communications 6 Pooja Sharma 1 Pawan Bhadana 2 1 B.S.Anangpuria Institute of Technology and Management, Faridabad, Haryana, India Poojasharma161@gmail.com

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks Random Early Detection (RED) gateways Sally Floyd CS 268: Computer Networks floyd@eelblgov March 20, 1995 1 The Environment Feedback-based transport protocols (eg, TCP) Problems with current Drop-Tail

More information

SIMULATION-BASED COMPARISON OF SCHEDULING TECHNIQUES IN MULTIPROGRAMMING OPERATING SYSTEMS ON SINGLE AND MULTI-CORE PROCESSORS *

SIMULATION-BASED COMPARISON OF SCHEDULING TECHNIQUES IN MULTIPROGRAMMING OPERATING SYSTEMS ON SINGLE AND MULTI-CORE PROCESSORS * SIMULATION-BASED COMPARISON OF SCHEDULING TECHNIQUES IN MULTIPROGRAMMING OPERATING SYSTEMS ON SINGLE AND MULTI-CORE PROCESSORS * Hala ElAarag, David Bauschlicher, and Steven Bauschlicher Department of

More information

PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES

PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES Karann Chew, Rahim Tafazolli University of Surrey, United Kingdom Abstract - GPRS is part of the evolution

More information

A Survey on Quality of Service and Congestion Control

A Survey on Quality of Service and Congestion Control A Survey on Quality of Service and Congestion Control Ashima Amity University Noida, U.P, India batra_ashima@yahoo.co.in Sanjeev Thakur Amity University Noida, U.P, India sthakur.ascs@amity.edu Abhishek

More information

OPERATING SYSTEMS CS3502 Spring Processor Scheduling. Chapter 5

OPERATING SYSTEMS CS3502 Spring Processor Scheduling. Chapter 5 OPERATING SYSTEMS CS3502 Spring 2018 Processor Scheduling Chapter 5 Goals of Processor Scheduling Scheduling is the sharing of the CPU among the processes in the ready queue The critical activities are:

More information

Fairness in bandwidth allocation for ABR congestion avoidance algorithms

Fairness in bandwidth allocation for ABR congestion avoidance algorithms Fairness in bandwidth allocation for ABR congestion avoidance algorithms Bradley Williams, Neco Ventura Dept of Electrical Engineering, University of Cape Town, Private Bag, Rondebosch, South Africa {bwillia,

More information

INAP and CAMEL Training

INAP and CAMEL Training INAP and CAMEL Training OVERVIEW The goal of the Intelligent Network (IN) concept was to decouple services and features from the switches themselves - that is seperate service intelligence from the switching

More information

Improved Load Balancing in Distributed Service Architectures

Improved Load Balancing in Distributed Service Architectures Improved Load Balancing in Distributed Service Architectures LI-CHOO CHEN, JASVAN LOGESWAN, AND AZIAH ALI Faculty of Engineering, Multimedia University, 631 Cyberjaya, MALAYSIA. Abstract: - The advancement

More information

Impact of transmission errors on TCP performance. Outline. Random Errors

Impact of transmission errors on TCP performance. Outline. Random Errors Impact of transmission errors on TCP performance 1 Outline Impact of transmission errors on TCP performance Approaches to improve TCP performance Classification Discussion of selected approaches 2 Random

More information

Modelling and Analysis of Push Caching

Modelling and Analysis of Push Caching Modelling and Analysis of Push Caching R. G. DE SILVA School of Information Systems, Technology & Management University of New South Wales Sydney 2052 AUSTRALIA Abstract: - In e-commerce applications,

More information

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

HSS Resiliency Surviving attach storms in the networks of today and tomorrow

HSS Resiliency Surviving attach storms in the networks of today and tomorrow HSS Resiliency Surviving attach storms in the networks of today and tomorrow Strategic White Paper Mobile service providers are taking advantage of the lower operational costs associated with Long Term

More information

Multimedia Traffic Management and Congestion Control in Satellite ATM Networks

Multimedia Traffic Management and Congestion Control in Satellite ATM Networks Multimedia Traffic Management and Congestion Control in Satellite ATM Networks by S. Annukka Piironen Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of

More information

The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks

The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks E. Kozlovski, M. Düser, R. I. Killey, and P. Bayvel Department of and Electrical Engineering, University

More information

On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation

On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation On the Importance of Using Appropriate Link-to-System Level Interfaces for the Study of Link Adaptation Javier Gozalvez and John Dunlop Department of Electronic and Electrical Engineering, University of

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

MultiDSLA. Measuring Network Performance. Malden Electronics Ltd

MultiDSLA. Measuring Network Performance. Malden Electronics Ltd MultiDSLA Measuring Network Performance Malden Electronics Ltd The Business Case for Network Performance Measurement MultiDSLA is a highly scalable solution for the measurement of network speech transmission

More information

Robust Multiclass Signaling Overload Control

Robust Multiclass Signaling Overload Control 1 Robust Multiclass Signaling Overload Control S. Kasera J. Pinheiro C. Loader T. LaPorta M. Karaul A. Hari Univ. of Utah Novartis CWRU Penn State Univ. Consultant Lucent Abstract We propose multi-class

More information

Network Control and Signalling

Network Control and Signalling Network Control and Signalling 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches

More information

Interrupts Peter Rounce

Interrupts Peter Rounce Interrupts Peter Rounce P.Rounce@cs.ucl.ac.uk 22/11/2011 11-GC03 Interrupts 1 INTERRUPTS An interrupt is a signal to the CPU from hardware external to the CPU that indicates than some event has occured,

More information

The Total Network Volume chart shows the total traffic volume for the group of elements in the report.

The Total Network Volume chart shows the total traffic volume for the group of elements in the report. Tjänst: Network Health Total Network Volume and Total Call Volume Charts Public The Total Network Volume chart shows the total traffic volume for the group of elements in the report. Chart Description

More information

Congestion control in TCP

Congestion control in TCP Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed

More information

CHAPTER 3 ENHANCEMENTS IN DATA LINK LAYER

CHAPTER 3 ENHANCEMENTS IN DATA LINK LAYER 32 CHAPTER 3 ENHANCEMENTS IN DATA LINK LAYER This proposed work describes the techniques used in the data link layer to improve the performance of the TCP in wireless networks and MANETs. In the data link

More information

Chapter 9: Virtual-Memory

Chapter 9: Virtual-Memory Chapter 9: Virtual-Memory Management Chapter 9: Virtual-Memory Management Background Demand Paging Page Replacement Allocation of Frames Thrashing Other Considerations Silberschatz, Galvin and Gagne 2013

More information

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links Network Working Group Request for Comments: 1046 W. Prue J. Postel ISI February 1988 A Queuing Algorithm to Provide Type-of-Service for IP Links Status of this Memo This memo is intended to explore how

More information

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks

Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Analysis of Binary Adjustment Algorithms in Fair Heterogeneous Networks Sergey Gorinsky Harrick Vin Technical Report TR2000-32 Department of Computer Sciences, University of Texas at Austin Taylor Hall

More information

Continuous Real Time Data Transfer with UDP/IP

Continuous Real Time Data Transfer with UDP/IP Continuous Real Time Data Transfer with UDP/IP 1 Emil Farkas and 2 Iuliu Szekely 1 Wiener Strasse 27 Leopoldsdorf I. M., A-2285, Austria, farkas_emil@yahoo.com 2 Transilvania University of Brasov, Eroilor

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Signaling System 7 (SS7) By : Ali Mustafa

Signaling System 7 (SS7) By : Ali Mustafa Signaling System 7 (SS7) By : Ali Mustafa Contents Types of Signaling SS7 Signaling SS7 Protocol Architecture SS7 Network Architecture Basic Call Setup SS7 Applications SS7/IP Inter-working VoIP Network

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 21-24 English only Questions: 12 and 16/12 Geneva, 27-31 January 23 STUDY GROUP 12 DELAYED CONTRIBUTION 98 Source:

More information

Data Communications. Automatic Repeat Request Medium Access Control

Data Communications. Automatic Repeat Request Medium Access Control Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements

More information

NG NPTF PT1. Non-Geographic Number Portability Task Force PT1 : Service Description BIPT. Final Version NPNG2v1F 13/04/1999

NG NPTF PT1. Non-Geographic Number Portability Task Force PT1 : Service Description BIPT. Final Version NPNG2v1F 13/04/1999 Final Version NPNG2v1F 13/04/1999 Non-Geographic Number Portability Task Force PT1 : Service Description BIPT Table Of Contents Table Of Contents... 2 1. Scope... 3 2. Regulatory Requirements... 3 3. References...

More information

QUALITY of SERVICE. Introduction

QUALITY of SERVICE. Introduction QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia

More information

Scheduling. The Basics

Scheduling. The Basics The Basics refers to a set of policies and mechanisms to control the order of work to be performed by a computer system. Of all the resources in a computer system that are scheduled before use, the CPU

More information

Simulation Studies of the Basic Packet Routing Problem

Simulation Studies of the Basic Packet Routing Problem Simulation Studies of the Basic Packet Routing Problem Author: Elena Sirén 48314u Supervisor: Pasi Lassila February 6, 2001 1 Abstract In this paper the simulation of a basic packet routing problem using

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

BT Autobalance. Authoriser User Guide

BT Autobalance. Authoriser User Guide BT Autobalance Authoriser User Guide Contents Getting Started...3 Introduction...3 Sign In...4 Forgotten Password...4 Welcome to BT Autobalance (Step 1)...5 Manage Company Structure...5 Adding Elements...6

More information

Network-Adaptive Video Coding and Transmission

Network-Adaptive Video Coding and Transmission Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

Spanning Tree Operations. Topology Changes & Topology Change BPDUs

Spanning Tree Operations. Topology Changes & Topology Change BPDUs Spanning Tree Operations Topology Changes & Topology Change BPDUs 1 Rationale: There are a lot of misconceptions concerning Topology Changes and Topology Change BPDUs, these misconceptions are predicated

More information

QUALITY OF SERVICE AND THE EFFECTS OF DATA ENCRYPTION ON VSAT NETWORKS (GOVERNMENT NETWORKS)

QUALITY OF SERVICE AND THE EFFECTS OF DATA ENCRYPTION ON VSAT NETWORKS (GOVERNMENT NETWORKS) QUALITY OF SERVICE AND THE EFFECTS OF DATA ENCRYPTION ON VSAT NETWORKS (GOVERNMENT NETWORKS) Bruno VO VAN, Updated: June 2006 Page 1 de 6 SUMMARY 1 PREAMBLE....3 2 TECHNICAL CRITERIA...3 2.1 QUALITY TO

More information

EUROPEAN ETS TELECOMMUNICATION March 1996 STANDARD

EUROPEAN ETS TELECOMMUNICATION March 1996 STANDARD EUROPEAN ETS 300 208 TELECOMMUNICATION March 1996 STANDARD Source: ETSI TC-NA Reference: DE/NA-012212 ICS: 33.040 Key words: ISDN, supplementary service Integrated Services Digital Network (ISDN); Freephone

More information

Statistics Warehouse for Intelligent Networks Applying data warehouse technology in the telecommunications domain

Statistics Warehouse for Intelligent Networks Applying data warehouse technology in the telecommunications domain Statistics Warehouse for Intelligent Networks Applying data warehouse technology in the telecommunications domain J. Schabauer, H. Portschy, R. Siebenhofer, A. Holzinger SIEMENS AG AUSTRIA Program and

More information

Flow-start: Faster and Less Overshoot with Paced Chirping

Flow-start: Faster and Less Overshoot with Paced Chirping Flow-start: Faster and Less Overshoot with Paced Chirping Joakim Misund, Simula and Uni Oslo Bob Briscoe, Independent IRTF ICCRG, Jul 2018 The Slow-Start

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

WHITE PAPER. Latency & Jitter WHITE PAPER OVERVIEW

WHITE PAPER. Latency & Jitter WHITE PAPER OVERVIEW Latency & Jitter In Networking Performance Evaluation OVERVIEW Latency and jitter are two key measurement parameters when evaluating and benchmarking the performance of a network, system or device. Different

More information

Automatic Camp On enable/disable Table Destination for Incoming trunk call

Automatic Camp On enable/disable Table Destination for Incoming trunk call OVERVIEW When a call comes in from a trunk line to a station and the station is busy, Station Hunting or Call Forward is not applied and the call cannot be terminated by applying these features, the trunk

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Chapter III. congestion situation in Highspeed Networks

Chapter III. congestion situation in Highspeed Networks Chapter III Proposed model for improving the congestion situation in Highspeed Networks TCP has been the most used transport protocol for the Internet for over two decades. The scale of the Internet and

More information

TCP Congestion Control. Lecture 16. Outline. TCP Congestion Control. Additive Increase / Multiplicative Decrease (AIMD)

TCP Congestion Control. Lecture 16. Outline. TCP Congestion Control. Additive Increase / Multiplicative Decrease (AIMD) Lecture 16 TCP Congestion Control Homework 6 Due Today TCP uses ACK arrival as a signal to transmit a new packet. Since connections come-and-go TCP congestion control must be adaptive. TCP congestion control

More information

2 Network Basics. types of communication service. how communication services are implemented. network performance measures. switching.

2 Network Basics. types of communication service. how communication services are implemented. network performance measures. switching. 2 Network Basics types of communication service how communication services are implemented switching multiplexing network performance measures 1 2.1 Types of service in a layered network architecture connection-oriented:

More information