Real-time Performance Evaluation of Line Topology Switched Ethernet

Size: px
Start display at page:

Download "Real-time Performance Evaluation of Line Topology Switched Ethernet"

Transcription

1 International Journal of Automation and Computing 05(4), October 2008, DOI: /s Real-time Performance Evaluation of Line Topology Switched Ethernet Fan Cen Tao Xing Ke-Tong Wu Institute of Acoustics, the Chinese Academy of Sciences, Beijing , PRC Abstract: Recently, switched Ethernet has become an active area of research because of its wide uses in industry. However, its uses have various real-time constraints on data communications. This paper analyzes the performance of the line topology switched Ethernet as a data acquisition network. Network calculus theory, which has been successfully applied to assess the real-time performance of packet-switched networks, is used to analyze the networks. To properly describe the activity of switches, a novel approach of modeling data flows into or out of switches is addressed. Based on our model, a concisely analytical expression of the maximal end-to-end delay in line topology switched Ethernet is derived. Finally, the relative simulation results are demonstrated. These results agree well with the analytical results, and thus they validate the data flow modeling techniques. Keywords: Switched Ethernet, network calculus, end-to-end delay, line topology, real-time network. 1 Introduction Industrial communications are currently based on several kinds of specific networks, namely fieldbus, such as CAN, Profibuses, and DeviceNet. They interconnect industrial devices in order to exchange data for the purpose of monitoring, controlling, and other industrial processes. A large number of these applications are time-constrained, and hence, the main purpose of a fieldbus is to ensure that the end-to-end delays of messages are bounded and remain limited compared with the time-constraints of an application. The fieldbus has solved many communication problems in industrial processes; however, there is no universally accepted standard that supports communication among different fieldbus networks. Limited bandwidth is another disadvantage of the fieldbus. An existing and widely acceptable network technology has been found to be able to replace fieldbus; Ethernet is one of the most popular local area network (LAN) communication technologies. Several years ago, because of its random CSMA/CD bus arbitration, Ethernet could only be used for non-time-sensitive applications. At present, in most newly built Ethernets, the latest Ethernet switch technology is being used instead of the hub-based infrastructure. In other words, every device directly connects to a high-performance switch through a full duplex port such that every conflicting domain has only one device. In such point-to-point architectures, collisions cease to occur and the random back-off algorithm is no longer required. This provides an additional capability for Ethernet to support the transmission of time-critical information [1 7]. This aspect has received considerable attention for some time; current research mainly focuses on methods to determine the maximal delay of a network, in which field Network Calculus plays an important role [8 11]. Many researchers have attempted to develop a general model to represent switched Ethernet; however, their models cannot obtain a concisely analytical result that shows the maximal Manuscript received July 26, 2007; revised March 19, 2008 *Corresponding author. address: cenfan@gmail.com delay, and the key factors impact the delay. A consensus has been reached that due to the diversity in industrial communications, it is difficult to determine whether or not Ethernet is real-time capable. It depends on the limit value set for the industrial application. To derive the maximal delay of a given network, complex models are constructed. A phenomenon, called pay burst only once, is known to offer a closer upper bound of the delay. However, it is difficult to analyze the models, and most results are still hard to compute and are unintuitive. The objective of this paper is to estimate the delay bounds of a data acquisition system based on the line topology switched Ethernet. The reason for selecting line topology is as follows: firstly, line topology is basic and common in factory use; secondly, its performance is usually worse than that of other topologies because of the cascade switches, and therefore, it could act as a reference; lastly, it is easy to be described. The main aim of this paper is to derive a rather concisely analytical result that would facilitate estimation of the realtime performance of line topology networks. We also introduce an approach of applying network calculus to switched ethernet to avoid the pay burst only once phenomenon and thereby simplify the calculation. 2 Network calculus 2.1 Overview Network calculus is a newly developed theory based on min-plus algebra. It is now widely used to assess the realtime performance of communication networks. It is based on the fundamental work of [12, 13] and has been fully developed in [14]. This theory is tailored to the analysis of switched networks used in industrial scenarios. On one hand, this theory models all network elements as nodes and data flows. Networks on buses, such as conventional Ethernet, are difficult to describe using these elements. However, switched networks are suitable in this case. On the other hand, from certain reasonable assump-

2 F. Cen et al. / Real-time Performance Evaluation of Line Topology Switched Ethernet 377 tions about input data flows and service node activities, network calculus provides deterministic results on network delays, backlogs, and throughputs; it is different from the conventional methodology that uses stochastic process theory. This property is very important in industrial usage, which requires a strong QoS guarantee. 2.2 Basic concepts and results The basic concepts of network calculus include the arrival curve, service curve, and min-plus convolution/deconvolution. Here, only some basic and related concepts are covered to clarify the notations below; readers may consult [14] for a full introduction. Arrival curves quantify constraints on the number of packets or the number of bits that flow in a time interval at a service node. Let F be a data flow and R(t) bethe number of packets or bits of F arriving in the time interval [0,t]. We say that the flow is constrained or has an arrival curve α(t) if for all 0 s t, R(t) R(s) α(t s) (1) where α(t) is a non-negative and non-decreasing function. A service curve describes the service of flow F in a node, which is a work station or a switch. Let R (t) be the amount of data output in a time interval [0,t]. Then, the nonnegative, and non-decreasing function β(t) is called the service curve for F in this node if for all t 0, R (t) R β(t) = (2) inf 0 s t {R(s)β(t s)} where denotes the convolution operator. The output flow is constrained by the arrival curve α β(t) =sup 0 s t {α(t s) β(t)} (3) where denotes the deconvolution operator. The constraints given by the arrival and service curve for a flow suffice to calculate an upper bound on the delay of a packet or bit in the service node. The delay is bounded by the horizontal distance between α and β: delay sup t 0 {inf {s 0:α(t) β(t s)}}. (4) There is a specific result in network calculus on a service node serving two or more flows according to a first come first serve (FCFS) strategy. Consider a lossless node serving two flows in the FCFS order. Denote these two flows by F 1andF2, with arrival curves α1 andα2, respectively. Assume that the node guarantees a service curve of β to the aggregate of the two flows. Thus, F 1 is guaranteed by the service curve { [β(t) α 2(t θ)] for t>θ β 1(t) = (5) 0 for 0 t θ where [x] denotes (x x )/2. Conventionally, this property is called FCFS splitting. The widely used arrival curve for describing a data flow is the leaky bucket arrival curve. It is defined by α(t) = rt b for t>0, and 0 otherwise. Having a leaky bucket arrival curve allows a source to send b bits at once, but without exceeding r bit/s over the long run. Service curves of switches are mostly defined by β(t) =C [t T ],which is called the rate-latency service curve. Data is delayed by a fixed time T and then routed out at a rate C. Inreality,this service curve only represents one output port of a switch. These two curves are popular because of their simplicity. We will also apply these in our analysis. 2.3 Pay burst only once principle Consider two systems with service curve β 1 and β 2.What happens when a flow transverses the two systems in sequence? Boudec and Thiran [14] showed that the concatenation of the two systems offered an effective service curve of β 1 β 2 to the flow. Consequently, there are two ways to obtain the delay bounds: 1) by applying the network service curve; 2) by iteratively applying the individual bounds on every node. The result obtained by the latter approach is always greater than that of the former. This is because the delay due to the burstiness of the input flow is calculated twice; this phenomenon is called pay burst only once. While using network calculus to obtain the end-to-end delay of a large system, it is important to apply the pay burst only once principle. However, the use of this principle has two disadvantages. First, there is no universal approach to tell us how to apply this principle. People have to try their best to use this principle wherever they can. Second, the analysis of a large network becomes very difficult and always yields intricate results [15,16]. In the next section, a novel approach is raised to analyze switched Ethernet without the interference of the pay burst only once phenomenon. 3 Switched Ethernet analysis 3.1 State of art in Ethernet switches A switch can be functionally considered as a multiport bridge. However, it is more powerful than a conventional bridge due to its application specific integrated circuit (ASIC) based architecture and its ultra-rapid simultaneous multiple access memory. At present, highperformance switches are increasingly replacing conventional hubs. Commercially available switches from various manufacturers have the following technical properties in common. Store-and-forward. There are mainly three switch fabrics. They have shared memory, matrix, and bus. Shared memory is the most popular architecture; it can avoid the head of line (HOL) blocking. By using shared-memory, packets are always processed in the store-and-forward mode. Work-conserving. Switches will route out the packets received as soon as possible. They make full use of their output ports until their buffers are empty. First come first serve (FCFS) and priority queueing (PQ) strategies. When there are two flows originating from different ports but requiring the same output

3 378 International Journal of Automation and Computing 05(4), October 2008 port, the former strategy will serve the packet that arrives earlier, while the latter strategy would check and assign a non-preemptive priority to one flow. Wire-speed. All recent Ethernet switches are announced to operate with wire-speed and non-blocking. Wire-speed means that all ports of a switch can simultaneously transmit or receive at their full bit rates. It requires that the switch fabric can operate at a bit rate equal to the aggregate speeds of all the ports. A wire-speed switch does not require a back-to-back test and large memory because it can output the data that comes in from all ports in time. 4 Case study 4.1 Network configuration We assume the following application scenario: the Ethernet analyzed is used in a data acquisition system in which dozens or hundreds of identical sensors transmit cyclic messages to a central processing node. As mentioned before, we assume that it is a line topology network. There are N switches in a cascade and each of them is attached to M sensors; thus, there are M N sensors in total. The switches observe the FCFS strategy. Fig. 1 illustrates the network. 3.2 Procedure description As mentioned earlier, in switched Ethernet, every node is directly connected to a switch; thus we can describe an entire network if and only if we know all the data flows into and out of every switch. To obtain the end-to-end delay of a certain path in the network, we follow the procedure below. 1) Select the nodes through which the researched data flow F passes to form a node set S = {source node, switch F 1,switch F 2,,switch F N F, destination node}. Here, assume there are N F switches between the source and destination that relay the messages. 2) Choose bit granularity. The burstiness of all arrival curves, or α(0 ), should be the maximum packet length. In the store-and-forward operation, a packet will not be processed until all its bits are received; therefore, assume that they arrive at once. This burstiness constraint concerning the arrival curves is a basic assumption. 3) All data coming from an input port should be constrained by a single arrival curve. Since only one packet can arrive at a time in the physical channel, the arrival curve satisfying the above burstiness constraint must exist. 4) Each output port of each switch in S has its own service curve; this is obvious since all ports work simultaneously. 5) Use (3) to calculate the output flow, and then use a greedy shaper to reshape it. A greedy shaper is a shaper that delays the input bits in a buffer, whenever the sending of a bit would violate the shaping curve. Therefore, we should output them as soon as possible. Here, the shaping curve is α(0 )C t, whereα(0 ) is the burstiness of the input flow and C is the channel rate. The greedy shaper follows work-conserving and wire-speed properties and ensures that the output flow observes the burstiness constraint. Boudec and Thiran [14] showed that greedy shapers did not increase the delay or buffer requirements in this case. 6) Compute delays for interesting flow F by (4) and (5) at all switches in S. Sum up all delays to obtain the end-to-end delay. This procedure considers the characteristics of popular switching techniques and physical channels. Because burstiness is constrained to one packet length, the pay burst only once phenomenon no longer exists, allowing us to focus on the delay on every switch. Fig. 1 Network topology 4.2 Analytical delay bounds Each sensor ij, for1 i N and 1 j M, generates a data flow constrained by the arrival curve α ij(t) =r ijtb ij. For switch i, assume that it has an identical service curve β(t) =C (t T ). Delay T is due to the multiplexing of packets and other internal management functions in the switch. Consider the farthest node, sensor NM; its packets go through all switches, i.e., S = {sensir NM, switch N,switch N 1,,switch 1, processing node}. Atswitch N, we use (5) to obtain the service curve: β N (t) =C (t T ) [ r Nj(t θ) b Nj ] { (C β N (t) = rnj) (t θ) for t θ (6) 0 for 0 t θ where θ = T bnj/c. Using (4), we obtain the delay at switch N : delay N = T bnj b NM C C. (7) rnj The integrated output flow in which sensor NM sdatais taken has the arrival curve as follows: M M α N (t) = r Njt b Nj. (8) This is still a leaky bucket arrival curve. Before flowing to switch N 1, it must be reshaped by the greedy shaper to eliminate the redundant burstiness. After reshaping, the flow will have a traffic specification (T-SPEC) arrival curve: α reshaped N (t) = min ( M M ) r Njt b Nj, Ct b N (9)

4 F. Cen et al. / Real-time Performance Evaluation of Line Topology Switched Ethernet 379 where b N = max(b Nj), for j = 1,,M. By repeating the above calculation and using the results from the former step, we eventually obtain the end-to-end delay delay =NT N 1 i=1 bnj b NM C C rnj ( M bij b ) i C C bnm M rij C (10) where b i =max(b ij, b i1), for i =1,,N 1andj = 1,,M. The last term is due to the path from sensor NM to switch N. The calculation is easy because every arrival curve needed is either leaky bucket or T-SPEC constrained. In many data acquisition applications, each sensor acquires data at the same rate and all the inbound packets have identical lengths. Hence, assuming b ij = b and r ij = r, we have delay = N(T Mb (N 1)b ) C C Mr b C (M 1)r. (11) Since T is usually negligibly small, the maximal end-toend delay approximately increases with N (the number of switches) and b (the packet length). 5 Simulation Fig. 2 End-to-end delay obtained by network calculus and simulation The simulation model was realized with Network Simulator The number of switches was selected from the set {3, 6, 9, 12, 15}. Packet length was selected from {64, 128, 256, 512, 1024, 1518}, which covers the shortest and the longest Ethernet packets in IEEE All sensors transmit packets simultaneously every 12.5ms with a 2% jitter. Fig. 2 shows the predicted end-to-end delay using network calculus and the simulation results. In our simulation, the average bit rate r does not vary, so the backbone bandwidth is linearly proportional to the number of switches and the packet length. As a result, the packets delay also increases with the backbone bandwidth utility. The maximal backbone bandwidth utility varies from 7.4% to 87.4% and the two surfaces agree well. In addition, Fig. 3 illustrates the percentage difference between the calculation and simulation results. We can see that the calculation results are always larger than the simulation results because network calculus theory always considers the theoretical worst-case scenario. Moreover, the error is less than 20% at all points considered. Thus, the procedure introduced above is useful in estimating real-time network performance. Under the heaviest bandwidth load, the maximal end-toend delay exceeds 13 ms, which is greater than the packetsending period. This may violate the real-time constraints in some factory applications. Fig. 3 Difference between calculation and simulation results 6 Conclusions In this paper, we proposed a new procedure to calculate the end-to-end delay in switched Ethernet using network calculus. Additionally, we applied this procedure to assess the real-time performance of line topology switched Ethernet, which only has aggregate flows. The analytical results presented in this paper using network calculus show two points: first, they agree well with the simulation results, showing that the proposed procedure is applicable in this circumstance; second, the maximal end-to-end delay in

5 380 International Journal of Automation and Computing 05(4), October 2008 the network that we researched linearly increases with the packet length and switch number, which are the key factors impacting the delay. It can guarantee deterministic bounds on transaction times. Depending on various requirements and appropriate network design, the switched Ethernet is able to satisfy the real-time constraints in industrial applications. In real industrial applications, the networks always carry many kinds of data. Hybrid data flows that contain cyclic and acyclic data with different priorities will be studied later. Acknowledgement The authors would like to thank the anonymous reviewers for their advice. References [1] A. Pandey, H. M. Alnuweiri. Quality of Service Support over Switched Ethernet. In Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, IEEE Press, Victoria, BC, Canada, pp , [2] Y. Q. Song. Time Constrained Communication over Switched Ethernet. In Proceedings of the 4th IFAC International Conference on Fieldbus Systems and Their Applications-FeT, Nancy, France, pp , [3] K. C. Lee, S. Lee. Performance Evaluation of Switched Ethernet for Real-time Industrial Communications. Computer Standards & Interfaces, vol. 24, no. 5, pp , [4] Z. Wang, Y. Song, J. M. Chen, Y. X. Sun. Real Time Characteristics of Ethernet and Its Improvement. In Proceedings of the 4th World Congress on Intelligent Control and Automation, IEEE Press, Shanghai, PRC, vol. 2, pp , [5] A. Jacobs, J. Wernicke, S. Oral, B. Gordon, A. George. Experimental Characterization of QoS in Commercial Ethernet Switches for Statistically Bounded Latency in Aircraft Netwoks. In Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, pp , [6] J. D. Decotignie. Ethernet-based Real-time and Industrial Communications. Proceedings of the IEEE, vol. 93, no. 6, pp , [7] K. C. Lee, S. Lee, M. H. Lee. Worst Case Communication Delay of Real-time Industrial Switched Ethernet with Multiple Levels. IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp , [8] J. Jasperneite, P. Neumann, M. Theis, K. Watson. Deterministic Real-time Communication with Switched Ethernet. In Proceedings of the 4th IEEE International Workshop on Factory Communication Systems, IEEE Press, Västeräs, Sweden, pp , [9] J. P. Georges, E. Rondeau, T. Divoux. Evaluation of Switched Ethernet in an Industrial Context by Using Network Calculus. In Proceedings of the 4th IEEE International Workshop on Factory Communication Systems, IEEE Press, Västeräs, Sweden, pp , [10] M. Bertoluzzo, G. Buja, S. Vitturi. Ethernet Networks for Factory Automation. In Proceedings of the IEEE International Symposium on Industrial Electronics, IEEE Press, vol. 1, pp , [11] J. P. Georges. T. Divoux, E. Rondeau. Comparison of Switched Ethernet Architectures Models. In Procceedings of the Conference on Emerging Technologies and Factory Automation, IEEE Press, vol. 1, pp , [12] R. L. Cruz. A Calculus for Network Delay, Part I: Network Elements in Isolation. IEEE Transactions on Information Theory, vol. 37, no. 1, pp , [13] R. L. Cruz. A Calculus for Network Delay, Part II: Network Analysis. IEEE Transactions on Information Theory, vol. 37, no. 1, pp , [14] J. L. Boudec, P. Thiran. Network Calculus: A Theory of Deteministic Queuing Systems for the Internet, Springer- Verlag, Berlin, [15] K. S. Watson. Network Calculus in Star and Line Networks with Centralized Communication, Technical Report IITB 10573, Fraunhofer-Institut für Informations-und Datenverarbeitung, Karlsruhe, [16] M. Fidler. Extending the Network Calculus Pay Bursts Only Once Principle to Aggregate Scheduling. In Proceedings of the Second International Workshop on Quality of Service in Multiservice IP Networks, Lecture Notes in Computer Science, Springer-Verlag, vol. 2601, pp , works. Fan Cen received the B. Sc. degree in electronic engineering from the Tsinghua University, PRC, in He is currently a Ph. D. candidate in the Institute of Acoustics, Chinese Academy of Sciences (IA- CAS). He received the Outstanding Student Award from the Graduate School of Chinese Academy of Sciences in His research interests include embedded system design and interconnection net- Tao Xing graduated from Tsinghua University, PRC, in He received the Ph. D. degree from the Institute of Acoustics, Chinese Academy of Sciences (IA- CAS), in He is currently an associate professor at the Sonar Engineering Laboratory, IACAS. His research interests include circuit and system, high performance signal processing, and data acquisition. Ke-Tong Wu received the B. Sc. degree in electronic science & engineering from Nanjing University, PRC, in He is currently a Ph. D. candidate at IACAS. His research interests include statistical and array signal processing, machine learning and their applications.

Application of Network Calculus to the TSN Problem Space

Application of Network Calculus to the TSN Problem Space Application of Network Calculus to the TSN Problem Space Jean Yves Le Boudec 1,2,3 EPFL IEEE 802.1 Interim Meeting 22 27 January 2018 1 https://people.epfl.ch/105633/research 2 http://smartgrid.epfl.ch

More information

Cross Clock-Domain TDM Virtual Circuits for Networks on Chips

Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Zhonghai Lu Dept. of Electronic Systems School for Information and Communication Technology KTH - Royal Institute of Technology, Stockholm

More information

EDF-Based Real-Time Message Scheduling of Periodic Messages on a Master-Slave-Based Synchronized Switched Ethernet

EDF-Based Real-Time Message Scheduling of Periodic Messages on a Master-Slave-Based Synchronized Switched Ethernet EDF-Based Real-Time Message Scheduling of Periodic Messages on a Master-Slave-Based Synchronized Switched Ethernet Myung-Kyun Kim 1, Liang Shan 1, and Wang Yu 2 1 University of Ulsan, Mugeo-Dong, Nam-Gu,

More information

T-Spec Examples for Audio-Video Bridging. Osama Aboul-Magd

T-Spec Examples for Audio-Video Bridging. Osama Aboul-Magd T-Spec Eamples for Audio-Video Bridging Osama Aboul-Magd Source TSPEC for IP Intserv > Five parameters describing the traffic, p, r, b, m, M. > Peak rate, p measured in bytes of IP datagram per second

More information

Worst-case end-to-end delay analysis of an avionics AFDX network

Worst-case end-to-end delay analysis of an avionics AFDX network Worst-case end-to-end delay analysis of an avionics AFDX network Henri Bauer,, Jean-Luc Scharbarg, Christian Fraboul Airbus France - 6 Route de Bayonne 00 Toulouse, France Université de Toulouse - IRIT/ENSEEIHT/INPT

More information

Stochastic upper bounds for heterogeneous flows using a Static Priority Queueing on an AFDX network

Stochastic upper bounds for heterogeneous flows using a Static Priority Queueing on an AFDX network Stochastic upper bounds for heterogeneous flows using a Static Priority Queueing on an AFDX network Frédéric Ridouard, Jean-Luc Scharbarg, Christian Fraboul Université de Toulouse - IRIT/ENSEEIHT 2, rue

More information

Chapter 6 Connecting Device

Chapter 6 Connecting Device Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks

More information

The effect of per-input shapers on the delay bound in networks with aggregate scheduling

The effect of per-input shapers on the delay bound in networks with aggregate scheduling The effect of per-input shapers on the delay bound in networks with aggregate scheduling Evgueni Ossipov and Gunnar Karlsson Department of Microelectronics and Information Technology KTH, Royal Institute

More information

DetServ: Network Models for Real-Time QoS Provisioning in SDN-based Industrial Environments

DetServ: Network Models for Real-Time QoS Provisioning in SDN-based Industrial Environments c 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including 1 reprinting/republishing this material for

More information

Worst-Case Delay Analysis of Master-Slave Switched Ethernet Networks

Worst-Case Delay Analysis of Master-Slave Switched Ethernet Networks Worst-Case Delay Analysis of Master-Slave Switched Ethernet Networks Mohammad Ashjaei Mälardalen University, Västerås, Sweden mohammad.ashjaei@mdh.se Meng Liu Mälardalen University, Västerås, Sweden meng.liu@mdh.se

More information

Formal Modeling and Analysis of Stream Processing Systems

Formal Modeling and Analysis of Stream Processing Systems Formal Modeling and Analysis of Stream Processing Systems Linh T.X. Phan March 2009 Computer and Information Science University of Pennsylvania 1 High performance Highly optimized requirements systems

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Experimental evaluation of end-to-end delay in switched Ethernet application in the automotive domain

Experimental evaluation of end-to-end delay in switched Ethernet application in the automotive domain Experimental evaluation of end-to-end delay in switched Ethernet application in the automotive domain Kostas Beretis, Ieroklis Symeonidis To cite this version: Kostas Beretis, Ieroklis Symeonidis. Experimental

More information

Network Model for Delay-Sensitive Traffic

Network Model for Delay-Sensitive Traffic Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.

More information

Analysis of IP-based Real-Time In-Car Networks with Network Calculus Revsbech, Kasper; Nielsen, Jimmy Jessen; Harritsø, Kevin; Steffen, Rainer

Analysis of IP-based Real-Time In-Car Networks with Network Calculus Revsbech, Kasper; Nielsen, Jimmy Jessen; Harritsø, Kevin; Steffen, Rainer Aalborg Universitet Analysis of IP-based Real-Time In-Car Networks with Network Calculus Revsbech, Kasper; Nielsen, Jimmy Jessen; Harritsø, Kevin; Steffen, Rainer Publication date: 2009 Document Version

More information

Shuangyin Ren, Quanyou Feng, Yu Wang, and Wenhua Dou

Shuangyin Ren, Quanyou Feng, Yu Wang, and Wenhua Dou A Service Curve of Hierarchical Token Bucket Queue Discipline on Soft-Ware Defined Networks Based on Deterministic Network Calculus: An Analysis and Simulation Shuangyin Ren, Quanyou Feng, Yu Wang, and

More information

STOCHASTIC NETWORK CALCULUS FOR END-TO-END DELAY EVALUATION OF AVIONICS MULTI-HOP VIRTUAL LINKS

STOCHASTIC NETWORK CALCULUS FOR END-TO-END DELAY EVALUATION OF AVIONICS MULTI-HOP VIRTUAL LINKS STOCHASTIC NETWORK CALCULUS FOR END-TO-END DELAY EVALUATION OF AVIONICS MULTI-HOP VIRTUAL LINKS Frédéric Ridouard, Jean-Luc Scharbarg, Christian Fraboul Toulouse University - IRIT - ENSEEIHT 2, rue Camichel

More information

QUT Digital Repository:

QUT Digital Repository: QUT Digital Repository: http://eprints.qut.edu.au/ Gui, Li and Tian, Yu-Chu and Fidge, Colin J. (2007) Performance Evaluation of IEEE 802.11 Wireless Networks for Real-time Networked Control Systems. In

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

EP2210 Scheduling. Lecture material:

EP2210 Scheduling. Lecture material: EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom

More information

The Switched Local Area Networks Delay Problem: Issues and a Deterministic Solution Approach

The Switched Local Area Networks Delay Problem: Issues and a Deterministic Solution Approach 47 Chapter 3 The Switched Local Area Networks Delay Problem: Issues and a Deterministic Solution Approach Monday O. Eyinagho Covenant University, Nigeria Samuel O. Falaki Federal University of Technology

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada

More information

Stochastic Delay Analysis for Protocols with Self-similar Traffic

Stochastic Delay Analysis for Protocols with Self-similar Traffic 22 7th International ICST Conference on Communications and Networking in China (CHINACOM) Stochastic Delay Analysis for 82 Protocols with Self-similar Traffic Jie Zhang, Li Yu, Lie Jiang, Jingjing Luo

More information

Performance of a Switched Ethernet: A Case Study

Performance of a Switched Ethernet: A Case Study Performance of a Switched Ethernet: A Case Study M. Aboelaze A Elnaggar Dept. of Computer Science Dept of Electrical Engineering York University Sultan Qaboos University Toronto Ontario Alkhod 123 Canada

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

Real-Time (Paradigms) (47)

Real-Time (Paradigms) (47) Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed

More information

QUALITY of SERVICE. Introduction

QUALITY of SERVICE. Introduction QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia

More information

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay 6.1.2 Repeaters A single Ethernet segment can have a maximum length of 500 meters with a maximum of 100 stations (in a cheapernet segment it is 185m). To extend the length of the network, a repeater may

More information

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks

A Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission

More information

CSCI Spring Final Exam Solution

CSCI Spring Final Exam Solution CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and

More information

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors

More information

Credit Determination of Fibre Channel in Avionics Environment

Credit Determination of Fibre Channel in Avionics Environment Chinese Journal of Aeronautics 20(2007) 247-252 Chinese Journal of Aeronautics www.elsevier.com/locate/cja Credit Determination of Fibre Channel in Avionics Environment LIN Qiang*, XIONG Hua-gang, ZHANG

More information

AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems

AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems Alan Burns, James Harbin, Leandro Indrusiak, Iain Bate, Robert Davis and David Griffin Real-Time Systems Research Group

More information

Analysis of Switched Ethernet Networks with different Topologies used in Automation Systems

Analysis of Switched Ethernet Networks with different Topologies used in Automation Systems Analysis of Switched Ethernet Networks with different Topologies used in Automation Systems S. Rüping 1, E. Vonnahme 1, J. Jasperneite 2 1 Heinz Nixdorf Institut University of Paderborn System and Circuit

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

Formal Modeling and Analysis of Stream Processing Systems

Formal Modeling and Analysis of Stream Processing Systems Formal Modeling and Analysis of Stream Processing Systems (cont.) Linh T.X. Phan March 2009 Computer and Information Science University of Pennsylvania 1 Previous Lecture General concepts of the performance

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

UNIVERSITY OF CALIFORNIA, SAN DIEGO. A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline

UNIVERSITY OF CALIFORNIA, SAN DIEGO. A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline UNIVERSITY OF CALIFORNIA, SAN DIEGO A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline A thesis submitted in partial satisfaction of the requirements for the degree Master

More information

Comparison of Shaping and Buffering for Video Transmission

Comparison of Shaping and Buffering for Video Transmission Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440

More information

Additional Switched Ethernet Protocol for Industrial Hard Real-Time Traffic

Additional Switched Ethernet Protocol for Industrial Hard Real-Time Traffic Additional Switched Ethernet Protocol for Industrial Hard Real-Time Traffic ALIMUJIANG YIMING and TOSHIO EISAKA Dept of Computer Sciences Kitami Institute of Technology 165, Koen-cho, Kitami, Hokkaido

More information

Design of Large-scale Wire-speed Multicast Switching Fabric Based on Distributive Lattice

Design of Large-scale Wire-speed Multicast Switching Fabric Based on Distributive Lattice Design of Large-scale Wire-speed Multicast Switching Fabric Based on Distributive Lattice 1 CUI Kai, 2 LI Ke-dan, 1 CHEN Fu-xing, 1 ZHU Zhi-pu, 1 ZHU Yue-sheng 1. Shenzhen Eng. Lab of Converged Networks

More information

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz Maryam Keyvani Milan Nikolic Ljiljana Trajkovic SIMULATION OF PACKET DATA NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China

More information

A Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network

A Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network 4th Internatio Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network Shaojun WU1,3*, Liqian WANG2,Yueying ZHAN1,

More information

A Worst Case Performance Model for TDM Virtual Circuit in NoCs

A Worst Case Performance Model for TDM Virtual Circuit in NoCs A Worst Case Performance Model for TDM Virtual Circuit in NoCs Zhipeng Chen and Axel Jantsch Royal Institute of Technology(KTH), Sweden {zhipeng,axel}@kth.se Abstract. In Network-on-Chip (NoC), Time-Division-Mutiplexing

More information

Deadlock-free XY-YX router for on-chip interconnection network

Deadlock-free XY-YX router for on-chip interconnection network LETTER IEICE Electronics Express, Vol.10, No.20, 1 5 Deadlock-free XY-YX router for on-chip interconnection network Yeong Seob Jeong and Seung Eun Lee a) Dept of Electronic Engineering Seoul National Univ

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE

A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE A. Hadjiantonis, S. Sherif, A. Khalil, T. Rahman, G. Ellinas, M. F. Arend, and M. A. Ali, Department of Electrical Engineering,

More information

Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network

Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Thomas Nolte, Hans Hansson, and Christer Norström Mälardalen Real-Time Research Centre Department of Computer Engineering

More information

Real-time characteristics of Switched Ethernet for

Real-time characteristics of Switched Ethernet for Real-time characteristics of Switched Ethernet for "1553B"-Embedded Applications: Simulation and Analysis Ahlem Mifdaoui Toulouse University ENSICA 1 place Emile Blouin 31056 Toulouse, France Email: ahlem.mifdaoui

More information

Stream Sessions: Stochastic Analysis

Stream Sessions: Stochastic Analysis Stream Sessions: Stochastic Analysis Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath and Dr. Kumar Outline Loose bounds

More information

Network-on-Chip Micro-Benchmarks

Network-on-Chip Micro-Benchmarks Network-on-Chip Micro-Benchmarks Zhonghai Lu *, Axel Jantsch *, Erno Salminen and Cristian Grecu * Royal Institute of Technology, Sweden Tampere University of Technology, Finland Abstract University of

More information

Adaptive packet scheduling for requests delay guaranties in packetswitched computer communication network

Adaptive packet scheduling for requests delay guaranties in packetswitched computer communication network Paweł Świątek Institute of Computer Science Wrocław University of Technology Wybrzeże Wyspiańskiego 27 50-370 Wrocław, Poland Email: pawel.swiatek@pwr.wroc.pl Adam Grzech Institute of Computer Science

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

Dynamic Flow Regulation for IP Integration on Network-on-Chip

Dynamic Flow Regulation for IP Integration on Network-on-Chip Dynamic Flow Regulation for IP Integration on Network-on-Chip Zhonghai Lu and Yi Wang Dept. of Electronic Systems KTH Royal Institute of Technology Stockholm, Sweden Agenda The IP integration problem Why

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

1188 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 5, OCTOBER Wei Sun, Student Member, IEEE, and Kang G. Shin, Fellow, IEEE

1188 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 5, OCTOBER Wei Sun, Student Member, IEEE, and Kang G. Shin, Fellow, IEEE 1188 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 5, OCTOBER 2005 End-to-End Delay Bounds for Traffic Aggregates Under Guaranteed-Rate Scheduling Algorithms Wei Sun, Student Member, IEEE, and Kang

More information

Advanced Mechanisms for Available Rate Usage in ATM and Differentiated Services Networks

Advanced Mechanisms for Available Rate Usage in ATM and Differentiated Services Networks Advanced Mechanisms for Available Rate Usage in ATM and Differentiated Services Networks Roland Bless, Dirk Holzhausen, Hartmut Ritter, Klaus Wehrle Institute of Telematics, University of Karlsruhe Zirkel

More information

An Approach for Enhanced Performance of Packet Transmission over Packet Switched Network

An Approach for Enhanced Performance of Packet Transmission over Packet Switched Network ISSN (e): 2250 3005 Volume, 06 Issue, 04 April 2016 International Journal of Computational Engineering Research (IJCER) An Approach for Enhanced Performance of Packet Transmission over Packet Switched

More information

Implementation of the hardwired AFDX NIC

Implementation of the hardwired AFDX NIC Implementation of the hardwired AFDX NIC Pusik Park, Hangyun Jung KETI #68 Yatap, Bundang, Seongnam, Gyeonggi, Korea +82-31-789-{7318, 7319} {parksik, junghg}@keti.kr Daekyo Shin, Kitaeg Lim KETI #68 Yatap,

More information

Lesson 14: QoS in IP Networks: IntServ and DiffServ

Lesson 14: QoS in IP Networks: IntServ and DiffServ Slide supporting material Lesson 14: QoS in IP Networks: IntServ and DiffServ Giovanni Giambene Queuing Theory and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved

More information

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING ZVI LOTKER, BOAZ PATT-SHAMIR, AND ADI ROSÉN Abstract. We consider the model of adversarial queuing theory for packet networks introduced by Borodin et al.

More information

Scheduling Algorithms to Minimize Session Delays

Scheduling Algorithms to Minimize Session Delays Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

Architecture Modeling and Analysis for Embedded Systems

Architecture Modeling and Analysis for Embedded Systems Architecture Modeling and Analysis for Embedded Systems Overview of AADL and related research activities in RTG Oleg Sokolsky September 19, 2008 Overview Background Architecture description languages Embedded

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

Ultra-Low Latency Shaper

Ultra-Low Latency Shaper Ultra-Low Latency Shaper Christian Boiger christian.boiger@fh-deggendorf.de IEEE 802 Plenary July 2011 San Francisco, CA 1 Why Is a Ultra-Low Latency Class Necessary? Current priority of traffic classes

More information

Routing Algorithms, Process Model for Quality of Services (QoS) and Architectures for Two-Dimensional 4 4 Mesh Topology Network-on-Chip

Routing Algorithms, Process Model for Quality of Services (QoS) and Architectures for Two-Dimensional 4 4 Mesh Topology Network-on-Chip Routing Algorithms, Process Model for Quality of Services (QoS) and Architectures for Two-Dimensional 4 4 Mesh Topology Network-on-Chip Nauman Jalil, Adnan Qureshi, Furqan Khan, and Sohaib Ayyaz Qazi Abstract

More information

Nested QoS: Providing Flexible Performance in Shared IO Environment

Nested QoS: Providing Flexible Performance in Shared IO Environment Nested QoS: Providing Flexible Performance in Shared IO Environment Hui Wang Peter Varman hw5@rice.edu pjv@rice.edu Rice University, USA Abstract The increasing popularity of storage and server consolidation

More information

Real-Time Medical Data over WLANs

Real-Time Medical Data over WLANs 2015 International Conference on Computational Science and Computational Intelligence Real-Time Medical Data over WLANs Constantine Coutras Department of Computer Science Montclair State University Montclair,

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.1: Internetworking Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer

More information

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi QUALITY OF SERVICE EVALUATION IN IEEE 802.15.4 NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi *M.Tech. (ECE) in Deptt. of ECE at CET,Moradabad, U.P., India **Assistant professor in Deptt. of ECE at CET, Moradabad,

More information

Full Duplex Switched Ethernet for Next Generation 1553B -based Applications

Full Duplex Switched Ethernet for Next Generation 1553B -based Applications Full Duplex Switched Ethernet for Next Generation 1553B -based Applications Ahlem Mifdaoui Toulouse University ENSICA 1 place Emile Blouin 31056 Toulouse, France Ahlem.Mifdaoui@ensica.fr Fabrice Frances

More information

Scheduling with Bus Access Optimization for Distributed Embedded Systems

Scheduling with Bus Access Optimization for Distributed Embedded Systems 472 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 8, NO. 5, OCTOBER 2000 Scheduling with Bus Access Optimization for Distributed Embedded Systems Petru Eles, Member, IEEE, Alex

More information

Evaluation of NOC Using Tightly Coupled Router Architecture

Evaluation of NOC Using Tightly Coupled Router Architecture IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. II (Jan Feb. 2016), PP 01-05 www.iosrjournals.org Evaluation of NOC Using Tightly Coupled Router

More information

QoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior

QoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior Table of Contents QoS Configuration 1 Overview 1 Introduction to QoS 1 QoS Policy 1 Traffic Policing 2 Congestion Management 3 Line Rate 9 Configuring a QoS Policy 9 Configuration Task List 9 Configuring

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

10. Network dimensioning

10. Network dimensioning Partly based on slide material by Samuli Aalto and Jorma Virtamo ELEC-C7210 Modeling and analysis of communication networks 1 Contents Introduction Parameters: topology, routing and traffic Dimensioning

More information

Congestion Control Open Loop

Congestion Control Open Loop Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental

More information

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application Ling Wang ling.wang2@wayne.edu Outline Introduction Parameterization Differentiation Evaluation

More information

Mixed Criticality Scheduling in Time-Triggered Legacy Systems

Mixed Criticality Scheduling in Time-Triggered Legacy Systems Mixed Criticality Scheduling in Time-Triggered Legacy Systems Jens Theis and Gerhard Fohler Technische Universität Kaiserslautern, Germany Email: {jtheis,fohler}@eit.uni-kl.de Abstract Research on mixed

More information

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,

More information

Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) Fair Queueing

Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay)  Fair Queueing Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark Fair Queueing 2 Today Wireline Queue Drop Wireless Queue Drop 3 Types of Congestion Control Strategies

More information

Internetworking Wireless Nodes to A Control Area Network

Internetworking Wireless Nodes to A Control Area Network Internetworking Wireless Nodes to A Control Area Network A. Kutlu, H. Ekiz, M.D. Baba, E.T. Powner School of Engineering University of Sussex Brighton U.K. ABSTRACT This paper discusses the design and

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

An Efficient Implementation of Burst Fair Queuing for ATM Networking

An Efficient Implementation of Burst Fair Queuing for ATM Networking An Efficient Implementation of Burst Fair Queuing for ATM Networking Anthony T. Chronopoulos, Caimu Tang Abstract Fair queueing, which was developed in last decade and was aimed at general packet switching

More information

Module 17: "Interconnection Networks" Lecture 37: "Introduction to Routers" Interconnection Networks. Fundamentals. Latency and bandwidth

Module 17: Interconnection Networks Lecture 37: Introduction to Routers Interconnection Networks. Fundamentals. Latency and bandwidth Interconnection Networks Fundamentals Latency and bandwidth Router architecture Coherence protocol and routing [From Chapter 10 of Culler, Singh, Gupta] file:///e /parallel_com_arch/lecture37/37_1.htm[6/13/2012

More information

A Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing

A Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing A Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing Sanya Tangpongprasit, Takahiro Katagiri, Hiroki Honda, Toshitsugu Yuba Graduate School of Information

More information

An optically transparent ultra high speed LAN-ring employing OTDM

An optically transparent ultra high speed LAN-ring employing OTDM An optically transparent ultra high speed LAN-ring employing OTDM K. Bengi, G. Remsak, H.R. van As Vienna University of Technology, Institute of Communication Networks Gusshausstrasse 25/388, A-1040 Vienna,

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get

More information