ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS

Size: px
Start display at page:

Download "ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS"

Transcription

1 ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS JUAN CARLOS ARAGON SUMMIT STANFORD UNIVERSITY

2 TABLE OF CONTENTS 1. BACKGROUND RESEARCH Page 1.1. INTRODUCTION PACKET LOSS AND NETWORK DELAY INTERACTION ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND DELAY LOSS CONDITIONED IN DELAY DELAY CONDITIONED IN LOSS CHARACTERIZATION OF DELAY AND PACKET LOSS DELAY MODEL LOSS MODEL TEST PLAN 2.1. OBJECTIVES PHASE 1-NETWORK CHARACTERIZATION PHASE 2-NETWORK EMULATION PHASE 3-PERFORMANCE EVALUATION OF SURGICAL TRAINING APPLICATIONS 15 REFERENCES 16 2

3 1 BACKGROUND RESEARCH 1.1 INTRODUCTION Previous research performed in the area of evaluation of surgical training applications considered the impact that network metrics such as packet loss, delay, and jitter would have on the perceived quality of the application [6]. The research considered in this case analyzed the degradation of the quality that software applications interconnected through the network will experience by varying every network metric individually. We have observed that in some scenarios the different network metrics change simultaneously and consequently their combined effect has a specific impact on the perceived quality of the applications. These scenarios are different from those where the network metrics impact the quality of the application when they are modified individually while keeping the other metrics constant (e.g., just having a specific level of end-to-end latency between two networked applications mainly due to propagation delay experienced in the network connection). Some network metrics such as packet loss and network delay change simultaneously when the networking equipments that interconnect the applications start experiencing increased levels of congestion. In consequence, to account for this interaction it is necessary to go beyond the individual variation of each metric and to analyze the impact of the simultaneous variation of packet loss and delay. An ideal scenario for a network connection used to interconnect the software applications is that this connection is always uncongested. It has been experienced in practice that other network traffic (i.e., internet Traffic) might cause congestion along the end-to-end route that is used to transport the traffic of the software applications. Therefore it is important to understand and analyze the level of correlation that exists between packet loss and network delay as a consequence of congestion and to study the impact that this correlation has in the users perceived quality of software applications used for surgical training. 1.2 PACKET LOSS AND NETWORK DELAY INTERACTION Traditional Internet applications such as telnet and ftp use TCP as their transport layer protocol, and depend on TCP congestion control when there is congestion in the network. In TCP, a sender increases its transmission rate additively until it experiences a packet loss, which is taken as an indication of congestion. The sender then decreases its transmission rate multiplicatively, thus reacting quickly to the inferred congestion. As a result of this behavior, the transmission rate of the TCP sender is determined by the level of congestion in the network. Continuous media applications, on the other hand, usually react to network congestion with less flexibility (if at all), due to their more stringent timing constraints. Continuous media applications can be not only loss-adaptive, but delay-adaptive as well [1]. Such adaptive applications keep track of packet delays, and reflect any change in packet delays in their calculation of playout time. Given the above discussion, it is clear that packet loss and delay have tremendous impact on continuous media applications. Both loss and delay result from buffering within the network. As 3

4 packets traverse the network, they are queued in buffers (thus adding to their end-end delay) and from time to time are dropped due to buffer overflow. Consider then a continuous media packet stream at a buffer that is filling up fast with packets from other traffic sources as well. The packets from the continuous media application continue to be queued up in the growing packet queue together with the packets from other sources. Continuous media packets arriving at the receiver experience progressively higher end to end delays than earlier packets. When the buffer reaches its capacity, packet losses begin to occur. The receiver of the continuous media application thus sees increased delay, and eventually losses. Consider next a scenario in which packets from a continuous media application arrive at a buffer that is already full. In this case, they are dropped. As other sources (e.g, TCP connections) detect congestion and decrease their transmission rate, the queue length at the buffer will decrease, and packets from the continuous media application will start to be queued, rather than dropped. In this scenario, the receiver sees losses followed by high, but possibly decreasing, packet delays. The two examples above are plausible scenarios. In the first example, the receiver could have taken the increased delay as an indication of likely future packet loss; in the second scenario, the decreasing delay following loss indicates a future uncongested period of time. In both cases, the application could adapt its behavior accordingly. But do we expect such scenarios to occur (or be detectable) often in practice? Note that there are a number of implicit assumptions in the discussion above, including a single bottleneck link and presumed behavior by other competing applications. If delay is indeed affected by loss, or vice versa, how temporally close are they? What is causing such correlated behavior in the network? How can we exploit such information at the end-system? These are some of the issues that we address in the following section. 1.3 ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND DELAY Moon et al. [1] analyzed the correlation between packet loss and network delay considering that those events occur in sequence (e.g. delay precedes packet loss and packet loss precedes delay as pointed out in the previous section). In this approach, Moon establishes the analysis considering that from an event perspective, when a packet is dropped by the buffer (e.g, the packet is lost) then its delay cannot be determined. Therefore it is necessary to quantify the correlation between packet loss and delay using a metric that conditions network delay to the occurrence of packet loss. To collect end-end delay and loss data for a continuous media source, Moon sends packets with RTP headers at a fixed, periodic rate between workstations located at two remote end points connected through the Internet. The default RTP header has a fixed length of 12 bytes, and includes the version number, sequence number, media-specific timestamp, and source identifier. The sequence number is increased by one per packet, while the increment of a timestamp is dependent on the payload type. Moon maintains a log at both the source and the destination of real timestamps from the system clock along with the RTP sequence number and media-dependent timestamps; these are used to calculate end-end delay. To minimize the load inside the network, each packet had only the 12-byte RTP header, and did not carry any payload data. The metric used for correlation is the sample mean delay conditioned in loss. We first define the 4

5 unconditioned sample mean delay as follows:.(1) In this case: -N is the length of the trace of packets captured during each measurement session - i is the packet sequence number ( 1 < i < N ) - M number of packets that are delivered to the destination. - di is delay of the packet. Moon introduces a lag in calculating the sample mean delay conditioned on loss. Specifically, the sample mean delay, conditioned on a loss occurring at a time lag j packets in the past, is the sample mean of delay of all packets in the trace that have a loss j packets before them in the trace. The following notation allows to clarify the expression of sample mean delay conditioned on loss: li :indicates whether a packet is lost or delivered, specifically: If li = 0 then di = 0. Therefore the delay of a packet that has been lost is taken as zero. The sample mean delay conditioned in loss is defined as follows: The normalized sample mean delay conditioned in loss is defined as follows: (2)..(3) If the sample mean delay conditioned on loss at a positive lag of j is higher than the sample mean delay (i.e., the delay averaged over all received packets), it means that packets that arrive j packets after a loss have a higher average delay than a randomly chosen packet. That is, a loss occurring j packets in the past can be taken as a precursor to a higher delay later. A literal interpretation of a higher conditional average delay at a negative lag is less intuitive. In such a case, a loss can be thought of as an indicator of higher delay in the past. (This is the situation where high delay precedes the occurrence of packet loss). The sample mean delay conditioned on loss at a positive lag allows us to look at delays of future packets following a loss event. 5

6 1.3.1 Loss Conditioned in Delay To look at future loss conditioned on current packet delay, we can count the number of packets lost at a specific lag from a packet experiencing a given delay. This is expressed by the following:..(4) In this case Cj is counting the losses conditioned on a packet at time lag j having a delay above a given threshold, T. By varying within the range of and, we can observe how sensitive the losses are to the delays. Figure 1 plots the loss conditioned on delay as in (4). The threshold values used in calculation are 1, 1.5, and 2 times the unconditional mean delay. Figure 1 indicates that the loss conditioned on delay as a function of lag, computed via (4), is not particularly sensitive to the threshold value. Figure 1 Loss Conditioned in Delay Delay Conditioned in Loss In case of Delay conditioned in loss Figure 2 plots the normalized sample mean delay of six traces by using the equation (2). The range of the lag is between -500 and 500, which corresponds to 10 seconds in both positive and negative directions. All traces show higher loss-conditioned average delay near lag 0. This can be explained by an FCFS buffering process where packets that enter the queue just before an overflow experience a large queuing delay (since the queue is nearly full). Similarly, those packets successfully entering the buffer soon after an overflow event will also see a large queuing delay, since the queue is still nearly full. Another general observation of the graph is that the loss-conditioned average delay shows periodic behavior, dropping below the value of the unconditional mean delay at a given time lag and then rising again above that value for a larger lag. Traces 2.1 and 2.4 have a trace loss probability of less than Their graphs show a well-pronounced rise between lags of 50 and 100, a few more after lag 100 and when lags are negative. As the loss probability increases from those traces to Traces 2.3, 6

7 2.5, and 2.6 in an increasing order, the correlation graph flattens out. Trace 2.1 Trace 2.2 Trace 2.3 Trace 2.4 Trace 2.5 Trace 2.6 7

8 Figure 2 Delay Conditioned in Loss The analysis of the delay and loss measurements using the sample mean of delay conditioned on loss shows that it is likely that the packet delay would increase in a near future of a packet loss is detected. The loss conditioned on delay, on the other hand, is shown to be not sensitive to the threshold values of delay. Also we observe that some traces exhibit an oscillatory behavior when viewed using the sample mean delay conditioned on loss. 1.4 CHARACTERIZATION OF DELAY AND PACKET LOSS In the previous section we provided a characterization of the correlation between packet loss and delay. In this section we describe models used to characterize each parameter individually. Our motivation is to find models that would provide a mathematical description of the probability distributions for packet loss and network delay respectively Delay Model Bolot [2] proposes an interesting model in order to characterize network delay. The analysis of delay is based on the following queuing model : Figure 3 Bolot Queuing Model Where D represents the propagation delay (fixed) experienced by the packets as they travel from source to destination. The analysis is based on two successive applications of Lindley s recurrence equation. Lindley s recurrence equation expresses the relationship between the waiting times of two successive customers in a single channel queue. Specifically, let Wn denote the waiting time of packet n, Yn is the serving time of packet n, and Xn denote the interarrival time between packets n and n+1. Then..(5) A graphical proof of Lindley s recurrence equation is shown in Figure 4. 8

9 Figure 4 Lindley s Recurrence Equation We will use x+ to denote max(x,0). With this notation the above equation can be rewritten as.(6) We now go back to the queuing model. The model can be though of as a slotted-time model in which slot boundaries are defined by probe arrival times. We assume that the first probe packet arrives at the queue at time ( represents the interval between send times for probe packets), and hence that probe packet arrives at time. We refer to the interval As slot n. We assume that the Internet stream contributes Bits during slot n. Becomes a random variable, which characterizes the traffic pattern of the Internet stream. We further assume that all Bits arrive at the queue at the same time. Clearly Let and Denote the waiting time of the Internet packet. Applying Lindley s recurrence equation to we obtain. (7) In the above equation represents the probe packet length and the service rate of the queue expressed in bits/sec. Applying Lindley s recurrence equation to And, we obtain.(8) Substituting equation (7) into equation (8) we obtain.(9) The term Is positive if the buffer does not empty during the interval. Then the above equation becomes 9

10 (10) The term. Then the above equation becomes is positive if the buffer does not empty during the interval..(11) And hence (12) Thus the probability distribution of, I.e. the probability distribution of the Internet workload over an interval of length, can be estimated from the distribution of. Recall, however, that the above equality holds only if the buffer does not empty during this interval, then equation (12) might not hold. Therefore, it is reasonable to estimate Using equation (12) if is sufficiently small, typically if the product is smaller than some average value of. Figure 8 shows the distribution of for From equation (12), we see that..(13) i.e. is the Internet workload, expressed in ms, received by the server during slot n. We note that is also the interarrival time between packets n and n+1 when they arrive to their destination. The distribution approximates a geometric distribution. 10

11 Figure 5 Distribution of For Loss Model Sanneck et al. Yajnik et al and Bolot et al. recommend use of a Markov model to capture temporal loss dependency. All of them analyzed the 2-state Markov model, also known as the Gilbert model (Figure 2). It is simple to understand and to implement in monitoring applications. Figure 6 Gilbert Model In Figure 6 Is the probability that the next packet is loss, provided the previous one has arrived. Is the opposite. Is the conditional loss probability (clp). Normally. If, the Gilbert model reduces to a Bernoulli Model. From the definition, we can compute And, the state probability for state 0 and 1, respectively...(14) In the Gilbert model they also represent the mean arrival and loss probability, respectively., the probability distribution of loss runs with respect to loss length k, has a geometric distribution: 11

12 To calculate and From a packet trace, one can use loss length distribution statistics. Let, Denote the number of loss bursts having length, where Is the length of the longest loss bursts. Let denote the number of delivered packets, then p and q can be calculated as follows...(15) 12

13 2 TEST PLAN 2.1 OBJECTIVES The main objective of the testing is to perform network tests through the transmission of traffic over a set of specific connections (e.g, Stanford - U. Wisconsin) in order to characterize the packet and network delay characteristics with emphasis on the correlation between these network metrics under different congestion scenarios (every congestion scenario requires a simultaneous specification of delay and packet loss probability distributions). This characterization will be used in order to program a network emulator with probability distributions (for delay and packet loss simultaneously) that will reproduce network conditions under the different congestion scenarios. Finally, surgical training applications will be interconnected through the network emulator in order to study the impact on user quality for every congestion scenario that was previously characterized. The testing process is considered to be carried in three phases, which we describe below. The first three steps to be executed as part of the present test plan are motivated by the procedure followed by previous research performed at Summit on performance evaluation [1]. 2.2 PHASE 1-NETWORK CHARACTERIZATION The diagram below shows the design for the testing to be performed in this phase of the project. Figure 7 Test Design Stanford U. Wisconsin XX XX End-Point1a End-Point1b Console Program End-Point2a Switch Router Switch Router End-Point2b Internet2 (Load Generator) Congestion Controlled by Load Generator Probe Traffic Load Traffic Messaging Traffic (Report of Statistics to Console) Control Traffic (Setting-up of Connections and Control of Load Generation) This design is motivated by Lindley s recurrence equation (described in section 3), which is shown below: 13

14 In this equation represents the amount of bits of the Internet traffic stream and represents represents the amount of bits of the probe packet. As we see the waiting time for packet n depends on how big Becomes. In other words the amount of waiting delay in the queue for probe packets depends on the amount of Internet traffic. In this case the higher is, the higher the waiting delay and, in consequence, the higher the level of congestion. As the queue fills up with bigger queue starts discarding packets which increases packet loss. In the diagram shown in figure 7, the workstation labeled end-point1a is intended to generate probe traffic (traffic to be used to perform the characterization). The workstation labeled end-point2a is intended to generate load traffic. In this case our intention is to generate load in the network connection that exists between the two sites (e.g., to make Bigger) so that the probe traffic will face different congestion scenarios. In this way we can control de amount of congestion that we want to introduce in the connection so that our probe traffic will experience different levels of delay and packet loss. We can perform this control by increasing the amount of throughput and/or the packet size of the load traffic (traffic sent by workstation end-point2a). The workstations end-point1b and end-point2b work as reception points. We intend to use a performance tool program (Chariot or Agilent Application Analyzer) to generate probe traffic as well as load traffic through the end-point agents. Workstation end-point1a will also run the Console program, which is the one that will collect the statistics generated by the network testing between end-point1a and end-point1b. This Console will also control amount of load generated by endpoint2a. The objective is to generate a set of probability distributions for delay and packet loss at different congestion levels. Based on the analysis performed by Moon with regards to the correlation between delay and loss, we will first characterize probability distributions for network delay conditioned to different levels on average packet loss. Therefore each level of average packet loss will define a congestion level. Each congestion level will provide a probability distribution for delay and another for packet loss. 2.3 PHASE 2-NETWORK EMULATION Once we capture of probability distributions is completed in phase-1, we will develop a program (based on C++) that will emulate a network that will reproduce the different congestion levels previously characterized. The first approach for this phase will be to modify the source code of NistNET in order to introduce the capability of programming probability distributions for delay and loss. the 14

15 2.4 PHASE 3-PERFORMANCE EVALUATION OF SURGICAL TRAINING APPLICATIONS Once the emulator program is finished, we will study the impact on user perceived quality for the applications interconnected through the emulator program. The impact on quality will be studied under the different congestion scenarios that will involve simultaneous variation of packet loss and network delay metrics according to the characterization performed in phase 1. 15

16 REFERENCES [1] Correlation of Packet Delay and Loss in the Internet. Sue B. Moon, Jim Kurose, Don Towsley Technical Report 98-11, Department of Computer Science, University of Massachusetts, Amherst, MA [2] Characterizing End-to-end Packet Delay and Loss in the Internet. Jean-Chrysotome Bolot. Journal of High Speed Networks, vol2, no3,pp December [3] Modeling of packet Loss and Delay and Their effect on Real Time Multimedia Service Quality. Wenyu Jiang, Henning Schulzrinne. Department of Computer Science Columbia University. [4] Impact of Packet Spacing Time on Packet Loss under Loss Window Size for FEC Based Applications. Teruko Miyata, Harumoto Fukuda, Satoshi Ono. IEICE TRANS.INF. & SYS., VOL.E82-D, No4 APRIL [5] Measurement and Modelling of the Temporal Dependence in Packet Loss, Maya Yajnik, Sue Moon, Jim Kurose and Don Towsley. Department of Computer Science University of Massachusetts. [6] Performance of Remote Anatomy and Surgical Training Applications Under Varied Network Conditions. David Gutierrez, Amol Shah, and Dale A. Harris. SUMMIT / Department of Electrical Engineering Stanford University. 16

On TCP friendliness of VOIP traffic

On TCP friendliness of VOIP traffic On TCP friendliness of VOIP traffic By Rashmi Parthasarathy WSU ID # 10975537 A report submitted in partial fulfillment of the requirements of CptS 555 Electrical Engineering and Computer Science Department

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

A Real-Time Network Simulation Application for Multimedia over IP

A Real-Time Network Simulation Application for Multimedia over IP A Real-Time Simulation Application for Multimedia over IP ABSTRACT This paper details a Secure Voice over IP (SVoIP) development tool, the Simulation Application (Netsim), which provides real-time network

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

RTP/RTCP protocols. Introduction: What are RTP and RTCP?

RTP/RTCP protocols. Introduction: What are RTP and RTCP? RTP/RTCP protocols Introduction: What are RTP and RTCP? The spread of computers, added to the availability of cheap audio/video computer hardware, and the availability of higher connection speeds have

More information

Transport protocols Introduction

Transport protocols Introduction Transport protocols 12.1 Introduction All protocol suites have one or more transport protocols to mask the corresponding application protocols from the service provided by the different types of network

More information

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert

A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert A common issue that affects the QoS of packetized audio is jitter. Voice data requires a constant packet interarrival rate at receivers to convert data into a proper analog signal for playback. The variations

More information

Multimedia Networking

Multimedia Networking CMPT765/408 08-1 Multimedia Networking 1 Overview Multimedia Networking The note is mainly based on Chapter 7, Computer Networking, A Top-Down Approach Featuring the Internet (4th edition), by J.F. Kurose

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

Adaptive Playout Buffering for H.323 Voice over IP Applications

Adaptive Playout Buffering for H.323 Voice over IP Applications Adaptive Playout Buffering for H.323 Voice over IP Applications M. Narbutt and L. Murphy Department of Computer Science University College Dublin Belfield, Dublin 4 Abstract In this paper we investigate

More information

Parameter Equipment Motivation Monitoring method. Smooth play-out Test stream

Parameter Equipment Motivation Monitoring method. Smooth play-out Test stream IP transport requirements Packet Loss Ratio The ratio between the number of the packets lost in the network total and number the of transmitted packets1. Latency The time interval between initial transmission

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course: CS 349/449 Internet Protocols Final Exam Winter 2003 12/15/2003 Name: Course: Instructions: 1. You have 2 hours to finish 2. Question 9 is only for 449 students 3. Closed books, closed notes. Write all

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

Congestion control in TCP

Congestion control in TCP Congestion control in TCP If the transport entities on many machines send too many packets into the network too quickly, the network will become congested, with performance degraded as packets are delayed

More information

Bandwidth Allocation & TCP

Bandwidth Allocation & TCP Bandwidth Allocation & TCP The Transport Layer Focus Application Presentation How do we share bandwidth? Session Topics Transport Network Congestion control & fairness Data Link TCP Additive Increase/Multiplicative

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Modeling of temporal dependence in packet loss using universal modeling concepts

Modeling of temporal dependence in packet loss using universal modeling concepts SUBMITTED TO IEEE PACKET VIDEO WORKSHOP 2002 1 Modeling of temporal dependence in packet loss using universal modeling concepts Raghavendra Singh and Antonio Ortega Abstract Packet losses are commonplace

More information

CS 218 F Nov 3 lecture: Streaming video/audio Adaptive encoding (eg, layered encoding) TCP friendliness. References:

CS 218 F Nov 3 lecture: Streaming video/audio Adaptive encoding (eg, layered encoding) TCP friendliness. References: CS 218 F 2003 Nov 3 lecture: Streaming video/audio Adaptive encoding (eg, layered encoding) TCP friendliness References: J. Padhye, V.Firoiu, D. Towsley, J. Kurose Modeling TCP Throughput: a Simple Model

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

ECE 610: Homework 4 Problems are taken from Kurose and Ross.

ECE 610: Homework 4 Problems are taken from Kurose and Ross. ECE 610: Homework 4 Problems are taken from Kurose and Ross. Problem 1: Host A and B are communicating over a TCP connection, and Host B has already received from A all bytes up through byte 248. Suppose

More information

Internetworking Models The OSI Reference Model

Internetworking Models The OSI Reference Model Internetworking Models When networks first came into being, computers could typically communicate only with computers from the same manufacturer. In the late 1970s, the Open Systems Interconnection (OSI)

More information

Multimedia Service Quality. Wenyu Jiang, Henning Schulzrinne. Columbia University

Multimedia Service Quality. Wenyu Jiang, Henning Schulzrinne. Columbia University Modeling of Packet Loss and Delay and Their Effect on Real-Time Multimedia Service Quality Wenyu Jiang, Henning Schulzrinne fwenyu,schulzrinneg@cs.columbia.edu Department of Computer Science Columbia University

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

QoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm

QoS on Low Bandwidth High Delay Links. Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm QoS on Low Bandwidth High Delay Links Prakash Shende Planning & Engg. Team Data Network Reliance Infocomm Agenda QoS Some Basics What are the characteristics of High Delay Low Bandwidth link What factors

More information

Lab Test Report DR100401D. Cisco Nexus 5010 and Arista 7124S

Lab Test Report DR100401D. Cisco Nexus 5010 and Arista 7124S Lab Test Report DR100401D Cisco Nexus 5010 and Arista 7124S 1 April 2010 Miercom www.miercom.com Contents Executive Summary... 3 Overview...4 Key Findings... 5 How We Did It... 7 Figure 1: Traffic Generator...

More information

Model suitable for virtual circuit networks

Model suitable for virtual circuit networks . The leinrock Independence Approximation We now formulate a framework for approximation of average delay per packet in telecommunications networks. Consider a network of communication links as shown in

More information

Chapter III: Transport Layer

Chapter III: Transport Layer Chapter III: Transport Layer UG3 Computer Communications & Networks (COMN) Mahesh Marina mahesh@ed.ac.uk Slides thanks to Myungjin Lee and copyright of Kurose and Ross Principles of congestion control

More information

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control

CS519: Computer Networks. Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control : Computer Networks Lecture 5, Part 4: Mar 29, 2004 Transport: TCP congestion control TCP performance We ve seen how TCP the protocol works Sequencing, receive window, connection setup and teardown And

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long 6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long Please read Chapter 19 of the 6.02 book for background, especially on acknowledgments (ACKs), timers,

More information

Appendix B. Standards-Track TCP Evaluation

Appendix B. Standards-Track TCP Evaluation 215 Appendix B Standards-Track TCP Evaluation In this appendix, I present the results of a study of standards-track TCP error recovery and queue management mechanisms. I consider standards-track TCP error

More information

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste

Outline Computer Networking. TCP slow start. TCP modeling. TCP details AIMD. Congestion Avoidance. Lecture 18 TCP Performance Peter Steenkiste Outline 15-441 Computer Networking Lecture 18 TCP Performance Peter Steenkiste Fall 2010 www.cs.cmu.edu/~prs/15-441-f10 TCP congestion avoidance TCP slow start TCP modeling TCP details 2 AIMD Distributed,

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

Lecture 14: Congestion Control"

Lecture 14: Congestion Control Lecture 14: Congestion Control" CSE 222A: Computer Communication Networks George Porter Thanks: Amin Vahdat, Dina Katabi and Alex C. Snoeren Lecture 14 Overview" TCP congestion control review Dukkipati

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

"Filling up an old bath with holes in it, indeed. Who would be such a fool?" "A sum it is, girl," my father said. "A sum. A problem for the mind.

Filling up an old bath with holes in it, indeed. Who would be such a fool? A sum it is, girl, my father said. A sum. A problem for the mind. We were doing very well, up to the kind of sum when a bath is filling at the rate of so many gallons and two holes are letting the water out, and please to say how long it will take to fill the bath, when

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Digital Asset Management 5. Streaming multimedia

Digital Asset Management 5. Streaming multimedia Digital Asset Management 5. Streaming multimedia 2015-10-29 Keys of Streaming Media Algorithms (**) Standards (*****) Complete End-to-End systems (***) Research Frontiers(*) Streaming... Progressive streaming

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

RECOMMENDATION ITU-R BT.1720 *

RECOMMENDATION ITU-R BT.1720 * Rec. ITU-R BT.1720 1 RECOMMENDATION ITU-R BT.1720 * Quality of service ranking and measurement methods for digital video broadcasting services delivered over broadband Internet protocol networks (Question

More information

Chapter 4 Network Layer: The Data Plane

Chapter 4 Network Layer: The Data Plane Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see

More information

Part 2. Simulation Analysis

Part 2. Simulation Analysis 102 Part 2 Simulation Analysis In Part 1 of this dissertation, we have established that the relationship between packet loss events and increases in RTT samples is not conducive to DCA. We conjecture that

More information

Problem 7. Problem 8. Problem 9

Problem 7. Problem 8. Problem 9 Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate

More information

Performance Consequences of Partial RED Deployment

Performance Consequences of Partial RED Deployment Performance Consequences of Partial RED Deployment Brian Bowers and Nathan C. Burnett CS740 - Advanced Networks University of Wisconsin - Madison ABSTRACT The Internet is slowly adopting routers utilizing

More information

Congestion Propagation among Routers in the Internet

Congestion Propagation among Routers in the Internet Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,

More information

A model for Endpoint Admission Control Based on Packet Loss

A model for Endpoint Admission Control Based on Packet Loss A model for Endpoint Admission Control Based on Packet Loss Ignacio Más and Gunnar Karlsson ACCESS Linneaus Center School of Electrical Engineering KTH, Royal Institute of Technology 44 Stockholm, Sweden

More information

Topic 4a Router Operation and Scheduling. Ch4: Network Layer: The Data Plane. Computer Networking: A Top Down Approach

Topic 4a Router Operation and Scheduling. Ch4: Network Layer: The Data Plane. Computer Networking: A Top Down Approach Topic 4a Router Operation and Scheduling Ch4: Network Layer: The Data Plane Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 4-1 Chapter 4:

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren

Lecture 21: Congestion Control CSE 123: Computer Networks Alex C. Snoeren Lecture 21: Congestion Control" CSE 123: Computer Networks Alex C. Snoeren Lecture 21 Overview" How fast should a sending host transmit data? Not to fast, not to slow, just right Should not be faster than

More information

Performance Modeling

Performance Modeling Performance Modeling EECS 489 Computer Networks http://www.eecs.umich.edu/~zmao/eecs489 Z. Morley Mao Tuesday Sept 14, 2004 Acknowledgement: Some slides taken from Kurose&Ross and Katz&Stoica 1 Administrivia

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks The TCP Protocol Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu

More information

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach

Chapter 4 Network Layer: The Data Plane. Part A. Computer Networking: A Top Down Approach Chapter 4 Network Layer: The Data Plane Part A All material copyright 996-06 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th Edition, Global Edition Jim Kurose,

More information

Detecting Shared Congestion of Flows Via End-to-end Measurement

Detecting Shared Congestion of Flows Via End-to-end Measurement Detecting Shared Congestion of Flows Via End-to-end Measurement Dan Rubenstein Jim Kurose Don Towsley Department of Computer Science University of Massachusetts at Amherst http://www-net.cs.umass.edu/

More information

Improving Accuracy in End-to-end Packet Loss Measurement

Improving Accuracy in End-to-end Packet Loss Measurement Improving Accuracy in End-to-end Packet Loss Measurement Joel Sommers, Paul Barford, Nick Duffield, Amos Ron University of Wisconsin-Madison AT&T Labs-Research * * Background Understanding its basic characteristics

More information

WHITE PAPER. Latency & Jitter WHITE PAPER OVERVIEW

WHITE PAPER. Latency & Jitter WHITE PAPER OVERVIEW Latency & Jitter In Networking Performance Evaluation OVERVIEW Latency and jitter are two key measurement parameters when evaluating and benchmarking the performance of a network, system or device. Different

More information

COMMITTEE CONTRIBUTION Technical Committee TR-30 Meetings. IP Network Impairment Model

COMMITTEE CONTRIBUTION Technical Committee TR-30 Meetings. IP Network Impairment Model Telecommunications Industry Association (TIA) TR-30.3/03-04-13 Arlington, VA April 7-9, 2003 COMMITTEE CONTRIBUTION Technical Committee TR-30 Meetings SOURCE: CONTACT: TITLE: PROJECT: DISTRIBUTION: Telchemy

More information

15-744: Computer Networking TCP

15-744: Computer Networking TCP 15-744: Computer Networking TCP Congestion Control Congestion Control Assigned Reading [Jacobson and Karels] Congestion Avoidance and Control [TFRC] Equation-Based Congestion Control for Unicast Applications

More information

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter 6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION 6.1 Introduction Supporting Quality of Service

More information

Signature Amortization Using Multiple Connected Chains

Signature Amortization Using Multiple Connected Chains Signature Amortization Using Multiple Connected Chains Qusai Abuein 1 and Susumu Shibusawa 2 1 Graduate School of Science and Engineering 2 Department of Computer and Information Sciences Ibaraki University,

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.11 Chapter 3 outline 3.1 transport-layer services 3.2 multiplexing and

More information

4 rd class Department of Network College of IT- University of Babylon

4 rd class Department of Network College of IT- University of Babylon 1. INTRODUCTION We can divide audio and video services into three broad categories: streaming stored audio/video, streaming live audio/video, and interactive audio/video. Streaming means a user can listen

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 30 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks We started

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Circuit Breakers for Multimedia Congestion Control

Circuit Breakers for Multimedia Congestion Control Circuit Breakers for Multimedia Congestion Control Varun Singh Aalto University Stephen McQuistin, Martin Ellis, and Colin Perkins University of Glasgow Context Video conferencing seeing increasing deployment

More information

2.993: Principles of Internet Computing Quiz 1. Network

2.993: Principles of Internet Computing Quiz 1. Network 2.993: Principles of Internet Computing Quiz 1 2 3:30 pm, March 18 Spring 1999 Host A Host B Network 1. TCP Flow Control Hosts A, at MIT, and B, at Stanford are communicating to each other via links connected

More information

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

ECEN Final Exam Fall Instructor: Srinivas Shakkottai ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

Outline. Computer Communication and Networks. The Network Core. Components of the Internet. The Network Core Packet Switching Circuit Switching

Outline. Computer Communication and Networks. The Network Core. Components of the Internet. The Network Core Packet Switching Circuit Switching Outline Computer Communication and Networks 1 Department of Computer Science & Information Technology University of Balochistan Lecture 03 1/26 2/26 Two major components The mesh of packet switches and

More information

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control ETSF05/ETSF10 Internet Protocols Performance & QoS Congestion Control Quality of Service (QoS) Maintaining a functioning network Meeting applications demands User s demands = QoE (Quality of Experience)

More information

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup

Chapter 4. Routers with Tiny Buffers: Experiments. 4.1 Testbed experiments Setup Chapter 4 Routers with Tiny Buffers: Experiments This chapter describes two sets of experiments with tiny buffers in networks: one in a testbed and the other in a real network over the Internet2 1 backbone.

More information

Outline. QoS routing in ad-hoc networks. Real-time traffic support. Classification of QoS approaches. QoS design choices

Outline. QoS routing in ad-hoc networks. Real-time traffic support. Classification of QoS approaches. QoS design choices Outline QoS routing in ad-hoc networks QoS in ad-hoc networks Classifiction of QoS approaches Instantiation in IEEE 802.11 The MAC protocol (recap) DCF, PCF and QoS support IEEE 802.11e: EDCF, HCF Streaming

More information

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control

ETSF05/ETSF10 Internet Protocols. Performance & QoS Congestion Control ETSF05/ETSF10 Internet Protocols Performance & QoS Congestion Control Quality of Service (QoS) Maintaining a functioning network Meeting applications demands User s demands = QoE (Quality of Experience)

More information

Lecture 9 and 10. Source coding for packet networks

Lecture 9 and 10. Source coding for packet networks Lecture 9 and 10 Source coding for packet networks Outline Motivation/situation Source coding (representing the same information with less bits) (extremely short intro) Packet losses: - Packet loss measurements

More information

Part 1. Measurement Analysis

Part 1. Measurement Analysis 27 Part 1 Measurement Analysis The time scale associated with congestion at a bottleneck router within the Internet can range from milliseconds to many minutes [PAXS97]. Even during periods of sustained

More information

TCP so far Computer Networking Outline. How Was TCP Able to Evolve

TCP so far Computer Networking Outline. How Was TCP Able to Evolve TCP so far 15-441 15-441 Computer Networking 15-641 Lecture 14: TCP Performance & Future Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 Reliable byte stream protocol Connection establishments

More information

CSCE 463/612 Networks and Distributed Processing Spring 2017

CSCE 463/612 Networks and Distributed Processing Spring 2017 CSCE 463/612 Networks and Distributed Processing Spring 2017 Transport Layer VI Dmitri Loguinov Texas A&M University March 28, 2017 Original slides copyright 1996-2004 J.F Kurose and K.W. Ross 1 Chapter

More information

TCP Congestion Control : Computer Networking. Introduction to TCP. Key Things You Should Know Already. Congestion Control RED

TCP Congestion Control : Computer Networking. Introduction to TCP. Key Things You Should Know Already. Congestion Control RED TCP Congestion Control 15-744: Computer Networking L-4 TCP Congestion Control RED Assigned Reading [FJ93] Random Early Detection Gateways for Congestion Avoidance [TFRC] Equation-Based Congestion Control

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Network Layer Overview, Router Design, IP Sec 4.1. 4.2 and 4.3 Prof. Lina Battestilli Fall 2017 Chapter 4: Network Layer, Data Plane chapter goals: understand

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction In a packet-switched network, packets are buffered when they cannot be processed or transmitted at the rate they arrive. There are three main reasons that a router, with generic

More information

CS321: Computer Networks Congestion Control in TCP

CS321: Computer Networks Congestion Control in TCP CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

Network Performance: Queuing

Network Performance: Queuing Network Performance: Queuing EE 122: Intro to Communication Networks Fall 2006 (MW 4-5:30 in Donner 155) Vern Paxson TAs: Dilip Antony Joseph and Sukun Kim http://inst.eecs.berkeley.edu/~ee122/ Materials

More information

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data?

Congestion Control End Hosts. CSE 561 Lecture 7, Spring David Wetherall. How fast should the sender transmit data? Congestion Control End Hosts CSE 51 Lecture 7, Spring. David Wetherall Today s question How fast should the sender transmit data? Not tooslow Not toofast Just right Should not be faster than the receiver

More information

Sequence Number. Acknowledgment Number. Data

Sequence Number. Acknowledgment Number. Data CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

INTERNATIONAL TELECOMMUNICATION UNION

INTERNATIONAL TELECOMMUNICATION UNION INTERNATIONAL TELECOMMUNICATION UNION TELECOMMUNICATION STANDARDIZATION SECTOR STUDY PERIOD 21-24 English only Questions: 12 and 16/12 Geneva, 27-31 January 23 STUDY GROUP 12 DELAYED CONTRIBUTION 98 Source:

More information

SELECTION OF METRICS (CONT) Gaia Maselli

SELECTION OF METRICS (CONT) Gaia Maselli SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Investigating the Use of Synchronized Clocks in TCP Congestion Control

Investigating the Use of Synchronized Clocks in TCP Congestion Control Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet

More information

Estimating the Deliverable Quality of a Fully Redundant Dispersity Routing System

Estimating the Deliverable Quality of a Fully Redundant Dispersity Routing System Estimating the Deliverable Quality of a Fully Redundant Dispersity Routing System Stephan Bettermann and Yue Rong Department of Electrical and Computer Engineering Curtin University Bentley, Australia

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 15: Congestion Control Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

Fast RTP Retransmission for IPTV - Implementation and Evaluation

Fast RTP Retransmission for IPTV - Implementation and Evaluation Fast RTP Retransmission for IPTV - Implementation and Evaluation M.J. Prins, M. Brunner, G. Karagiannis, H. Lundqvist, and G. Nunzi Abstract With the deployment of IPTV reliability for multicast is becoming

More information

554 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 3, JUNE Ian F. Akyildiz, Fellow, IEEE, Özgür B. Akan, Member, IEEE, and Giacomo Morabito

554 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 3, JUNE Ian F. Akyildiz, Fellow, IEEE, Özgür B. Akan, Member, IEEE, and Giacomo Morabito 554 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 3, JUNE 2005 A Rate Control Scheme for Adaptive Real-Time Applications in IP Networks With Lossy Links and Long Round Trip Times Ian F Akyildiz, Fellow,

More information

Technical White Paper for Huawei's Videoconferencing Network Diagnostics Tool (NLog)

Technical White Paper for Huawei's Videoconferencing Network Diagnostics Tool (NLog) Technical White Paper for Huawei's Videoconferencing Network Diagnostics Tool (NLog) Huawei Technologies Co., Ltd. All rights reserved. Contents 1 Videoconferencing Network Conditions... 3 2 Overall Description...

More information