Real-time Performance Evaluation of Line Topology Switched Ethernet
|
|
- Rudolph Murphy
- 6 years ago
- Views:
Transcription
1 International Journal of Automation and Computing 05(4), October 2008, DOI: /s Real-time Performance Evaluation of Line Topology Switched Ethernet Fan Cen Tao Xing Ke-Tong Wu Institute of Acoustics, the Chinese Academy of Sciences, Beijing , PRC Abstract: Recently, switched Ethernet has become an active area of research because of its wide uses in industry. However, its uses have various real-time constraints on data communications. This paper analyzes the performance of the line topology switched Ethernet as a data acquisition network. Network calculus theory, which has been successfully applied to assess the real-time performance of packet-switched networks, is used to analyze the networks. To properly describe the activity of switches, a novel approach of modeling data flows into or out of switches is addressed. Based on our model, a concisely analytical expression of the maximal end-to-end delay in line topology switched Ethernet is derived. Finally, the relative simulation results are demonstrated. These results agree well with the analytical results, and thus they validate the data flow modeling techniques. Keywords: Switched Ethernet, network calculus, end-to-end delay, line topology, real-time network. 1 Introduction Industrial communications are currently based on several kinds of specific networks, namely fieldbus, such as CAN, Profibuses, and DeviceNet. They interconnect industrial devices in order to exchange data for the purpose of monitoring, controlling, and other industrial processes. A large number of these applications are time-constrained, and hence, the main purpose of a fieldbus is to ensure that the end-to-end delays of messages are bounded and remain limited compared with the time-constraints of an application. The fieldbus has solved many communication problems in industrial processes; however, there is no universally accepted standard that supports communication among different fieldbus networks. Limited bandwidth is another disadvantage of the fieldbus. An existing and widely acceptable network technology has been found to be able to replace fieldbus; Ethernet is one of the most popular local area network (LAN) communication technologies. Several years ago, because of its random CSMA/CD bus arbitration, Ethernet could only be used for non-time-sensitive applications. At present, in most newly built Ethernets, the latest Ethernet switch technology is being used instead of the hub-based infrastructure. In other words, every device directly connects to a high-performance switch through a full duplex port such that every conflicting domain has only one device. In such point-to-point architectures, collisions cease to occur and the random back-off algorithm is no longer required. This provides an additional capability for Ethernet to support the transmission of time-critical information [1 7]. This aspect has received considerable attention for some time; current research mainly focuses on methods to determine the maximal delay of a network, in which field Network Calculus plays an important role [8 11]. Many researchers have attempted to develop a general model to represent switched Ethernet; however, their models cannot obtain a concisely analytical result that shows the maximal Manuscript received July 26, 2007; revised March 19, 2008 *Corresponding author. address: cenfan@gmail.com delay, and the key factors impact the delay. A consensus has been reached that due to the diversity in industrial communications, it is difficult to determine whether or not Ethernet is real-time capable. It depends on the limit value set for the industrial application. To derive the maximal delay of a given network, complex models are constructed. A phenomenon, called pay burst only once, is known to offer a closer upper bound of the delay. However, it is difficult to analyze the models, and most results are still hard to compute and are unintuitive. The objective of this paper is to estimate the delay bounds of a data acquisition system based on the line topology switched Ethernet. The reason for selecting line topology is as follows: firstly, line topology is basic and common in factory use; secondly, its performance is usually worse than that of other topologies because of the cascade switches, and therefore, it could act as a reference; lastly, it is easy to be described. The main aim of this paper is to derive a rather concisely analytical result that would facilitate estimation of the realtime performance of line topology networks. We also introduce an approach of applying network calculus to switched ethernet to avoid the pay burst only once phenomenon and thereby simplify the calculation. 2 Network calculus 2.1 Overview Network calculus is a newly developed theory based on min-plus algebra. It is now widely used to assess the realtime performance of communication networks. It is based on the fundamental work of [12, 13] and has been fully developed in [14]. This theory is tailored to the analysis of switched networks used in industrial scenarios. On one hand, this theory models all network elements as nodes and data flows. Networks on buses, such as conventional Ethernet, are difficult to describe using these elements. However, switched networks are suitable in this case. On the other hand, from certain reasonable assump-
2 F. Cen et al. / Real-time Performance Evaluation of Line Topology Switched Ethernet 377 tions about input data flows and service node activities, network calculus provides deterministic results on network delays, backlogs, and throughputs; it is different from the conventional methodology that uses stochastic process theory. This property is very important in industrial usage, which requires a strong QoS guarantee. 2.2 Basic concepts and results The basic concepts of network calculus include the arrival curve, service curve, and min-plus convolution/deconvolution. Here, only some basic and related concepts are covered to clarify the notations below; readers may consult [14] for a full introduction. Arrival curves quantify constraints on the number of packets or the number of bits that flow in a time interval at a service node. Let F be a data flow and R(t) bethe number of packets or bits of F arriving in the time interval [0,t]. We say that the flow is constrained or has an arrival curve α(t) if for all 0 s t, R(t) R(s) α(t s) (1) where α(t) is a non-negative and non-decreasing function. A service curve describes the service of flow F in a node, which is a work station or a switch. Let R (t) be the amount of data output in a time interval [0,t]. Then, the nonnegative, and non-decreasing function β(t) is called the service curve for F in this node if for all t 0, R (t) R β(t) = (2) inf 0 s t {R(s)β(t s)} where denotes the convolution operator. The output flow is constrained by the arrival curve α β(t) =sup 0 s t {α(t s) β(t)} (3) where denotes the deconvolution operator. The constraints given by the arrival and service curve for a flow suffice to calculate an upper bound on the delay of a packet or bit in the service node. The delay is bounded by the horizontal distance between α and β: delay sup t 0 {inf {s 0:α(t) β(t s)}}. (4) There is a specific result in network calculus on a service node serving two or more flows according to a first come first serve (FCFS) strategy. Consider a lossless node serving two flows in the FCFS order. Denote these two flows by F 1andF2, with arrival curves α1 andα2, respectively. Assume that the node guarantees a service curve of β to the aggregate of the two flows. Thus, F 1 is guaranteed by the service curve { [β(t) α 2(t θ)] for t>θ β 1(t) = (5) 0 for 0 t θ where [x] denotes (x x )/2. Conventionally, this property is called FCFS splitting. The widely used arrival curve for describing a data flow is the leaky bucket arrival curve. It is defined by α(t) = rt b for t>0, and 0 otherwise. Having a leaky bucket arrival curve allows a source to send b bits at once, but without exceeding r bit/s over the long run. Service curves of switches are mostly defined by β(t) =C [t T ],which is called the rate-latency service curve. Data is delayed by a fixed time T and then routed out at a rate C. Inreality,this service curve only represents one output port of a switch. These two curves are popular because of their simplicity. We will also apply these in our analysis. 2.3 Pay burst only once principle Consider two systems with service curve β 1 and β 2.What happens when a flow transverses the two systems in sequence? Boudec and Thiran [14] showed that the concatenation of the two systems offered an effective service curve of β 1 β 2 to the flow. Consequently, there are two ways to obtain the delay bounds: 1) by applying the network service curve; 2) by iteratively applying the individual bounds on every node. The result obtained by the latter approach is always greater than that of the former. This is because the delay due to the burstiness of the input flow is calculated twice; this phenomenon is called pay burst only once. While using network calculus to obtain the end-to-end delay of a large system, it is important to apply the pay burst only once principle. However, the use of this principle has two disadvantages. First, there is no universal approach to tell us how to apply this principle. People have to try their best to use this principle wherever they can. Second, the analysis of a large network becomes very difficult and always yields intricate results [15,16]. In the next section, a novel approach is raised to analyze switched Ethernet without the interference of the pay burst only once phenomenon. 3 Switched Ethernet analysis 3.1 State of art in Ethernet switches A switch can be functionally considered as a multiport bridge. However, it is more powerful than a conventional bridge due to its application specific integrated circuit (ASIC) based architecture and its ultra-rapid simultaneous multiple access memory. At present, highperformance switches are increasingly replacing conventional hubs. Commercially available switches from various manufacturers have the following technical properties in common. Store-and-forward. There are mainly three switch fabrics. They have shared memory, matrix, and bus. Shared memory is the most popular architecture; it can avoid the head of line (HOL) blocking. By using shared-memory, packets are always processed in the store-and-forward mode. Work-conserving. Switches will route out the packets received as soon as possible. They make full use of their output ports until their buffers are empty. First come first serve (FCFS) and priority queueing (PQ) strategies. When there are two flows originating from different ports but requiring the same output
3 378 International Journal of Automation and Computing 05(4), October 2008 port, the former strategy will serve the packet that arrives earlier, while the latter strategy would check and assign a non-preemptive priority to one flow. Wire-speed. All recent Ethernet switches are announced to operate with wire-speed and non-blocking. Wire-speed means that all ports of a switch can simultaneously transmit or receive at their full bit rates. It requires that the switch fabric can operate at a bit rate equal to the aggregate speeds of all the ports. A wire-speed switch does not require a back-to-back test and large memory because it can output the data that comes in from all ports in time. 4 Case study 4.1 Network configuration We assume the following application scenario: the Ethernet analyzed is used in a data acquisition system in which dozens or hundreds of identical sensors transmit cyclic messages to a central processing node. As mentioned before, we assume that it is a line topology network. There are N switches in a cascade and each of them is attached to M sensors; thus, there are M N sensors in total. The switches observe the FCFS strategy. Fig. 1 illustrates the network. 3.2 Procedure description As mentioned earlier, in switched Ethernet, every node is directly connected to a switch; thus we can describe an entire network if and only if we know all the data flows into and out of every switch. To obtain the end-to-end delay of a certain path in the network, we follow the procedure below. 1) Select the nodes through which the researched data flow F passes to form a node set S = {source node, switch F 1,switch F 2,,switch F N F, destination node}. Here, assume there are N F switches between the source and destination that relay the messages. 2) Choose bit granularity. The burstiness of all arrival curves, or α(0 ), should be the maximum packet length. In the store-and-forward operation, a packet will not be processed until all its bits are received; therefore, assume that they arrive at once. This burstiness constraint concerning the arrival curves is a basic assumption. 3) All data coming from an input port should be constrained by a single arrival curve. Since only one packet can arrive at a time in the physical channel, the arrival curve satisfying the above burstiness constraint must exist. 4) Each output port of each switch in S has its own service curve; this is obvious since all ports work simultaneously. 5) Use (3) to calculate the output flow, and then use a greedy shaper to reshape it. A greedy shaper is a shaper that delays the input bits in a buffer, whenever the sending of a bit would violate the shaping curve. Therefore, we should output them as soon as possible. Here, the shaping curve is α(0 )C t, whereα(0 ) is the burstiness of the input flow and C is the channel rate. The greedy shaper follows work-conserving and wire-speed properties and ensures that the output flow observes the burstiness constraint. Boudec and Thiran [14] showed that greedy shapers did not increase the delay or buffer requirements in this case. 6) Compute delays for interesting flow F by (4) and (5) at all switches in S. Sum up all delays to obtain the end-to-end delay. This procedure considers the characteristics of popular switching techniques and physical channels. Because burstiness is constrained to one packet length, the pay burst only once phenomenon no longer exists, allowing us to focus on the delay on every switch. Fig. 1 Network topology 4.2 Analytical delay bounds Each sensor ij, for1 i N and 1 j M, generates a data flow constrained by the arrival curve α ij(t) =r ijtb ij. For switch i, assume that it has an identical service curve β(t) =C (t T ). Delay T is due to the multiplexing of packets and other internal management functions in the switch. Consider the farthest node, sensor NM; its packets go through all switches, i.e., S = {sensir NM, switch N,switch N 1,,switch 1, processing node}. Atswitch N, we use (5) to obtain the service curve: β N (t) =C (t T ) [ r Nj(t θ) b Nj ] { (C β N (t) = rnj) (t θ) for t θ (6) 0 for 0 t θ where θ = T bnj/c. Using (4), we obtain the delay at switch N : delay N = T bnj b NM C C. (7) rnj The integrated output flow in which sensor NM sdatais taken has the arrival curve as follows: M M α N (t) = r Njt b Nj. (8) This is still a leaky bucket arrival curve. Before flowing to switch N 1, it must be reshaped by the greedy shaper to eliminate the redundant burstiness. After reshaping, the flow will have a traffic specification (T-SPEC) arrival curve: α reshaped N (t) = min ( M M ) r Njt b Nj, Ct b N (9)
4 F. Cen et al. / Real-time Performance Evaluation of Line Topology Switched Ethernet 379 where b N = max(b Nj), for j = 1,,M. By repeating the above calculation and using the results from the former step, we eventually obtain the end-to-end delay delay =NT N 1 i=1 bnj b NM C C rnj ( M bij b ) i C C bnm M rij C (10) where b i =max(b ij, b i1), for i =1,,N 1andj = 1,,M. The last term is due to the path from sensor NM to switch N. The calculation is easy because every arrival curve needed is either leaky bucket or T-SPEC constrained. In many data acquisition applications, each sensor acquires data at the same rate and all the inbound packets have identical lengths. Hence, assuming b ij = b and r ij = r, we have delay = N(T Mb (N 1)b ) C C Mr b C (M 1)r. (11) Since T is usually negligibly small, the maximal end-toend delay approximately increases with N (the number of switches) and b (the packet length). 5 Simulation Fig. 2 End-to-end delay obtained by network calculus and simulation The simulation model was realized with Network Simulator The number of switches was selected from the set {3, 6, 9, 12, 15}. Packet length was selected from {64, 128, 256, 512, 1024, 1518}, which covers the shortest and the longest Ethernet packets in IEEE All sensors transmit packets simultaneously every 12.5ms with a 2% jitter. Fig. 2 shows the predicted end-to-end delay using network calculus and the simulation results. In our simulation, the average bit rate r does not vary, so the backbone bandwidth is linearly proportional to the number of switches and the packet length. As a result, the packets delay also increases with the backbone bandwidth utility. The maximal backbone bandwidth utility varies from 7.4% to 87.4% and the two surfaces agree well. In addition, Fig. 3 illustrates the percentage difference between the calculation and simulation results. We can see that the calculation results are always larger than the simulation results because network calculus theory always considers the theoretical worst-case scenario. Moreover, the error is less than 20% at all points considered. Thus, the procedure introduced above is useful in estimating real-time network performance. Under the heaviest bandwidth load, the maximal end-toend delay exceeds 13 ms, which is greater than the packetsending period. This may violate the real-time constraints in some factory applications. Fig. 3 Difference between calculation and simulation results 6 Conclusions In this paper, we proposed a new procedure to calculate the end-to-end delay in switched Ethernet using network calculus. Additionally, we applied this procedure to assess the real-time performance of line topology switched Ethernet, which only has aggregate flows. The analytical results presented in this paper using network calculus show two points: first, they agree well with the simulation results, showing that the proposed procedure is applicable in this circumstance; second, the maximal end-to-end delay in
5 380 International Journal of Automation and Computing 05(4), October 2008 the network that we researched linearly increases with the packet length and switch number, which are the key factors impacting the delay. It can guarantee deterministic bounds on transaction times. Depending on various requirements and appropriate network design, the switched Ethernet is able to satisfy the real-time constraints in industrial applications. In real industrial applications, the networks always carry many kinds of data. Hybrid data flows that contain cyclic and acyclic data with different priorities will be studied later. Acknowledgement The authors would like to thank the anonymous reviewers for their advice. References [1] A. Pandey, H. M. Alnuweiri. Quality of Service Support over Switched Ethernet. In Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, IEEE Press, Victoria, BC, Canada, pp , [2] Y. Q. Song. Time Constrained Communication over Switched Ethernet. In Proceedings of the 4th IFAC International Conference on Fieldbus Systems and Their Applications-FeT, Nancy, France, pp , [3] K. C. Lee, S. Lee. Performance Evaluation of Switched Ethernet for Real-time Industrial Communications. Computer Standards & Interfaces, vol. 24, no. 5, pp , [4] Z. Wang, Y. Song, J. M. Chen, Y. X. Sun. Real Time Characteristics of Ethernet and Its Improvement. In Proceedings of the 4th World Congress on Intelligent Control and Automation, IEEE Press, Shanghai, PRC, vol. 2, pp , [5] A. Jacobs, J. Wernicke, S. Oral, B. Gordon, A. George. Experimental Characterization of QoS in Commercial Ethernet Switches for Statistically Bounded Latency in Aircraft Netwoks. In Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, pp , [6] J. D. Decotignie. Ethernet-based Real-time and Industrial Communications. Proceedings of the IEEE, vol. 93, no. 6, pp , [7] K. C. Lee, S. Lee, M. H. Lee. Worst Case Communication Delay of Real-time Industrial Switched Ethernet with Multiple Levels. IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp , [8] J. Jasperneite, P. Neumann, M. Theis, K. Watson. Deterministic Real-time Communication with Switched Ethernet. In Proceedings of the 4th IEEE International Workshop on Factory Communication Systems, IEEE Press, Västeräs, Sweden, pp , [9] J. P. Georges, E. Rondeau, T. Divoux. Evaluation of Switched Ethernet in an Industrial Context by Using Network Calculus. In Proceedings of the 4th IEEE International Workshop on Factory Communication Systems, IEEE Press, Västeräs, Sweden, pp , [10] M. Bertoluzzo, G. Buja, S. Vitturi. Ethernet Networks for Factory Automation. In Proceedings of the IEEE International Symposium on Industrial Electronics, IEEE Press, vol. 1, pp , [11] J. P. Georges. T. Divoux, E. Rondeau. Comparison of Switched Ethernet Architectures Models. In Procceedings of the Conference on Emerging Technologies and Factory Automation, IEEE Press, vol. 1, pp , [12] R. L. Cruz. A Calculus for Network Delay, Part I: Network Elements in Isolation. IEEE Transactions on Information Theory, vol. 37, no. 1, pp , [13] R. L. Cruz. A Calculus for Network Delay, Part II: Network Analysis. IEEE Transactions on Information Theory, vol. 37, no. 1, pp , [14] J. L. Boudec, P. Thiran. Network Calculus: A Theory of Deteministic Queuing Systems for the Internet, Springer- Verlag, Berlin, [15] K. S. Watson. Network Calculus in Star and Line Networks with Centralized Communication, Technical Report IITB 10573, Fraunhofer-Institut für Informations-und Datenverarbeitung, Karlsruhe, [16] M. Fidler. Extending the Network Calculus Pay Bursts Only Once Principle to Aggregate Scheduling. In Proceedings of the Second International Workshop on Quality of Service in Multiservice IP Networks, Lecture Notes in Computer Science, Springer-Verlag, vol. 2601, pp , works. Fan Cen received the B. Sc. degree in electronic engineering from the Tsinghua University, PRC, in He is currently a Ph. D. candidate in the Institute of Acoustics, Chinese Academy of Sciences (IA- CAS). He received the Outstanding Student Award from the Graduate School of Chinese Academy of Sciences in His research interests include embedded system design and interconnection net- Tao Xing graduated from Tsinghua University, PRC, in He received the Ph. D. degree from the Institute of Acoustics, Chinese Academy of Sciences (IA- CAS), in He is currently an associate professor at the Sonar Engineering Laboratory, IACAS. His research interests include circuit and system, high performance signal processing, and data acquisition. Ke-Tong Wu received the B. Sc. degree in electronic science & engineering from Nanjing University, PRC, in He is currently a Ph. D. candidate at IACAS. His research interests include statistical and array signal processing, machine learning and their applications.
Application of Network Calculus to the TSN Problem Space
Application of Network Calculus to the TSN Problem Space Jean Yves Le Boudec 1,2,3 EPFL IEEE 802.1 Interim Meeting 22 27 January 2018 1 https://people.epfl.ch/105633/research 2 http://smartgrid.epfl.ch
More informationCross Clock-Domain TDM Virtual Circuits for Networks on Chips
Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Zhonghai Lu Dept. of Electronic Systems School for Information and Communication Technology KTH - Royal Institute of Technology, Stockholm
More informationEDF-Based Real-Time Message Scheduling of Periodic Messages on a Master-Slave-Based Synchronized Switched Ethernet
EDF-Based Real-Time Message Scheduling of Periodic Messages on a Master-Slave-Based Synchronized Switched Ethernet Myung-Kyun Kim 1, Liang Shan 1, and Wang Yu 2 1 University of Ulsan, Mugeo-Dong, Nam-Gu,
More informationT-Spec Examples for Audio-Video Bridging. Osama Aboul-Magd
T-Spec Eamples for Audio-Video Bridging Osama Aboul-Magd Source TSPEC for IP Intserv > Five parameters describing the traffic, p, r, b, m, M. > Peak rate, p measured in bytes of IP datagram per second
More informationWorst-case end-to-end delay analysis of an avionics AFDX network
Worst-case end-to-end delay analysis of an avionics AFDX network Henri Bauer,, Jean-Luc Scharbarg, Christian Fraboul Airbus France - 6 Route de Bayonne 00 Toulouse, France Université de Toulouse - IRIT/ENSEEIHT/INPT
More informationStochastic upper bounds for heterogeneous flows using a Static Priority Queueing on an AFDX network
Stochastic upper bounds for heterogeneous flows using a Static Priority Queueing on an AFDX network Frédéric Ridouard, Jean-Luc Scharbarg, Christian Fraboul Université de Toulouse - IRIT/ENSEEIHT 2, rue
More informationChapter 6 Connecting Device
Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks
More informationThe effect of per-input shapers on the delay bound in networks with aggregate scheduling
The effect of per-input shapers on the delay bound in networks with aggregate scheduling Evgueni Ossipov and Gunnar Karlsson Department of Microelectronics and Information Technology KTH, Royal Institute
More informationDetServ: Network Models for Real-Time QoS Provisioning in SDN-based Industrial Environments
c 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including 1 reprinting/republishing this material for
More informationWorst-Case Delay Analysis of Master-Slave Switched Ethernet Networks
Worst-Case Delay Analysis of Master-Slave Switched Ethernet Networks Mohammad Ashjaei Mälardalen University, Västerås, Sweden mohammad.ashjaei@mdh.se Meng Liu Mälardalen University, Västerås, Sweden meng.liu@mdh.se
More informationFormal Modeling and Analysis of Stream Processing Systems
Formal Modeling and Analysis of Stream Processing Systems Linh T.X. Phan March 2009 Computer and Information Science University of Pennsylvania 1 High performance Highly optimized requirements systems
More informationUnit 2 Packet Switching Networks - II
Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source
More informationExperimental evaluation of end-to-end delay in switched Ethernet application in the automotive domain
Experimental evaluation of end-to-end delay in switched Ethernet application in the automotive domain Kostas Beretis, Ieroklis Symeonidis To cite this version: Kostas Beretis, Ieroklis Symeonidis. Experimental
More informationNetwork Model for Delay-Sensitive Traffic
Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.
More informationAnalysis of IP-based Real-Time In-Car Networks with Network Calculus Revsbech, Kasper; Nielsen, Jimmy Jessen; Harritsø, Kevin; Steffen, Rainer
Aalborg Universitet Analysis of IP-based Real-Time In-Car Networks with Network Calculus Revsbech, Kasper; Nielsen, Jimmy Jessen; Harritsø, Kevin; Steffen, Rainer Publication date: 2009 Document Version
More informationShuangyin Ren, Quanyou Feng, Yu Wang, and Wenhua Dou
A Service Curve of Hierarchical Token Bucket Queue Discipline on Soft-Ware Defined Networks Based on Deterministic Network Calculus: An Analysis and Simulation Shuangyin Ren, Quanyou Feng, Yu Wang, and
More informationSTOCHASTIC NETWORK CALCULUS FOR END-TO-END DELAY EVALUATION OF AVIONICS MULTI-HOP VIRTUAL LINKS
STOCHASTIC NETWORK CALCULUS FOR END-TO-END DELAY EVALUATION OF AVIONICS MULTI-HOP VIRTUAL LINKS Frédéric Ridouard, Jean-Luc Scharbarg, Christian Fraboul Toulouse University - IRIT - ENSEEIHT 2, rue Camichel
More informationQUT Digital Repository:
QUT Digital Repository: http://eprints.qut.edu.au/ Gui, Li and Tian, Yu-Chu and Fidge, Colin J. (2007) Performance Evaluation of IEEE 802.11 Wireless Networks for Real-time Networked Control Systems. In
More informationLecture 5: Performance Analysis I
CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationEP2210 Scheduling. Lecture material:
EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom
More informationThe Switched Local Area Networks Delay Problem: Issues and a Deterministic Solution Approach
47 Chapter 3 The Switched Local Area Networks Delay Problem: Issues and a Deterministic Solution Approach Monday O. Eyinagho Covenant University, Nigeria Samuel O. Falaki Federal University of Technology
More informationResource allocation in networks. Resource Allocation in Networks. Resource allocation
Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers
More informationSIMULATION OF PACKET DATA NETWORKS USING OPNET
SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada
More informationStochastic Delay Analysis for Protocols with Self-similar Traffic
22 7th International ICST Conference on Communications and Networking in China (CHINACOM) Stochastic Delay Analysis for 82 Protocols with Self-similar Traffic Jie Zhang, Li Yu, Lie Jiang, Jingjing Luo
More informationPerformance of a Switched Ethernet: A Case Study
Performance of a Switched Ethernet: A Case Study M. Aboelaze A Elnaggar Dept. of Computer Science Dept of Electrical Engineering York University Sultan Qaboos University Toronto Ontario Alkhod 123 Canada
More informationWorst-case Ethernet Network Latency for Shaped Sources
Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................
More informationPerformance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks
Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,
More informationReal-Time (Paradigms) (47)
Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed
More informationQUALITY of SERVICE. Introduction
QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia
More information6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay
6.1.2 Repeaters A single Ethernet segment can have a maximum length of 500 meters with a maximum of 100 stations (in a cheapernet segment it is 185m). To extend the length of the network, a repeater may
More informationA Reduce Identical Composite Event Transmission Algorithm for Wireless Sensor Networks
Appl. Math. Inf. Sci. 6 No. 2S pp. 713S-719S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. A Reduce Identical Composite Event Transmission
More informationCSCI Spring Final Exam Solution
CSCI 4211 16Spring Final Exam Solution 1. When an IP packet arrives a router, how the router decides what is the next router (output link) this packet to be forwarded to? What are the routing table and
More informationTELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)
TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors
More informationCredit Determination of Fibre Channel in Avionics Environment
Chinese Journal of Aeronautics 20(2007) 247-252 Chinese Journal of Aeronautics www.elsevier.com/locate/cja Credit Determination of Fibre Channel in Avionics Environment LIN Qiang*, XIONG Hua-gang, ZHANG
More informationAirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems
AirTight: A Resilient Wireless Communication Protocol for Mixed- Criticality Systems Alan Burns, James Harbin, Leandro Indrusiak, Iain Bate, Robert Davis and David Griffin Real-Time Systems Research Group
More informationAnalysis of Switched Ethernet Networks with different Topologies used in Automation Systems
Analysis of Switched Ethernet Networks with different Topologies used in Automation Systems S. Rüping 1, E. Vonnahme 1, J. Jasperneite 2 1 Heinz Nixdorf Institut University of Paderborn System and Circuit
More informationIMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS
IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST
More informationFormal Modeling and Analysis of Stream Processing Systems
Formal Modeling and Analysis of Stream Processing Systems (cont.) Linh T.X. Phan March 2009 Computer and Information Science University of Pennsylvania 1 Previous Lecture General concepts of the performance
More informationUsing Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions
Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College
More informationUNIVERSITY OF CALIFORNIA, SAN DIEGO. A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline
UNIVERSITY OF CALIFORNIA, SAN DIEGO A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline A thesis submitted in partial satisfaction of the requirements for the degree Master
More informationComparison of Shaping and Buffering for Video Transmission
Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440
More informationAdditional Switched Ethernet Protocol for Industrial Hard Real-Time Traffic
Additional Switched Ethernet Protocol for Industrial Hard Real-Time Traffic ALIMUJIANG YIMING and TOSHIO EISAKA Dept of Computer Sciences Kitami Institute of Technology 165, Koen-cho, Kitami, Hokkaido
More informationDesign of Large-scale Wire-speed Multicast Switching Fabric Based on Distributive Lattice
Design of Large-scale Wire-speed Multicast Switching Fabric Based on Distributive Lattice 1 CUI Kai, 2 LI Ke-dan, 1 CHEN Fu-xing, 1 ZHU Zhi-pu, 1 ZHU Yue-sheng 1. Shenzhen Eng. Lab of Converged Networks
More informationScheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router
Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all
More informationSIMULATION OF PACKET DATA NETWORKS USING OPNET
Nazy Alborz Maryam Keyvani Milan Nikolic Ljiljana Trajkovic SIMULATION OF PACKET DATA NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationPerformance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]
Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China
More informationA Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network
4th Internatio Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network Shaojun WU1,3*, Liqian WANG2,Yueying ZHAN1,
More informationA Worst Case Performance Model for TDM Virtual Circuit in NoCs
A Worst Case Performance Model for TDM Virtual Circuit in NoCs Zhipeng Chen and Axel Jantsch Royal Institute of Technology(KTH), Sweden {zhipeng,axel}@kth.se Abstract. In Network-on-Chip (NoC), Time-Division-Mutiplexing
More informationDeadlock-free XY-YX router for on-chip interconnection network
LETTER IEICE Electronics Express, Vol.10, No.20, 1 5 Deadlock-free XY-YX router for on-chip interconnection network Yeong Seob Jeong and Seung Eun Lee a) Dept of Electronic Engineering Seoul National Univ
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More informationA NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE
A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE A. Hadjiantonis, S. Sherif, A. Khalil, T. Rahman, G. Ellinas, M. F. Arend, and M. A. Ali, Department of Electrical Engineering,
More informationProbabilistic Worst-Case Response-Time Analysis for the Controller Area Network
Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Thomas Nolte, Hans Hansson, and Christer Norström Mälardalen Real-Time Research Centre Department of Computer Engineering
More informationReal-time characteristics of Switched Ethernet for
Real-time characteristics of Switched Ethernet for "1553B"-Embedded Applications: Simulation and Analysis Ahlem Mifdaoui Toulouse University ENSICA 1 place Emile Blouin 31056 Toulouse, France Email: ahlem.mifdaoui
More informationStream Sessions: Stochastic Analysis
Stream Sessions: Stochastic Analysis Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath and Dr. Kumar Outline Loose bounds
More informationNetwork-on-Chip Micro-Benchmarks
Network-on-Chip Micro-Benchmarks Zhonghai Lu *, Axel Jantsch *, Erno Salminen and Cristian Grecu * Royal Institute of Technology, Sweden Tampere University of Technology, Finland Abstract University of
More informationAdaptive packet scheduling for requests delay guaranties in packetswitched computer communication network
Paweł Świątek Institute of Computer Science Wrocław University of Technology Wybrzeże Wyspiańskiego 27 50-370 Wrocław, Poland Email: pawel.swiatek@pwr.wroc.pl Adam Grzech Institute of Computer Science
More informationSupporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)
Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing
More informationAdvanced Computer Networks
Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr
More informationDynamic Flow Regulation for IP Integration on Network-on-Chip
Dynamic Flow Regulation for IP Integration on Network-on-Chip Zhonghai Lu and Yi Wang Dept. of Electronic Systems KTH Royal Institute of Technology Stockholm, Sweden Agenda The IP integration problem Why
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More information1188 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 5, OCTOBER Wei Sun, Student Member, IEEE, and Kang G. Shin, Fellow, IEEE
1188 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 5, OCTOBER 2005 End-to-End Delay Bounds for Traffic Aggregates Under Guaranteed-Rate Scheduling Algorithms Wei Sun, Student Member, IEEE, and Kang
More informationAdvanced Mechanisms for Available Rate Usage in ATM and Differentiated Services Networks
Advanced Mechanisms for Available Rate Usage in ATM and Differentiated Services Networks Roland Bless, Dirk Holzhausen, Hartmut Ritter, Klaus Wehrle Institute of Telematics, University of Karlsruhe Zirkel
More informationAn Approach for Enhanced Performance of Packet Transmission over Packet Switched Network
ISSN (e): 2250 3005 Volume, 06 Issue, 04 April 2016 International Journal of Computational Engineering Research (IJCER) An Approach for Enhanced Performance of Packet Transmission over Packet Switched
More informationImplementation of the hardwired AFDX NIC
Implementation of the hardwired AFDX NIC Pusik Park, Hangyun Jung KETI #68 Yatap, Bundang, Seongnam, Gyeonggi, Korea +82-31-789-{7318, 7319} {parksik, junghg}@keti.kr Daekyo Shin, Kitaeg Lim KETI #68 Yatap,
More informationLesson 14: QoS in IP Networks: IntServ and DiffServ
Slide supporting material Lesson 14: QoS in IP Networks: IntServ and DiffServ Giovanni Giambene Queuing Theory and Telecommunications: Networks and Applications 2nd edition, Springer All rights reserved
More informationNEW STABILITY RESULTS FOR ADVERSARIAL QUEUING
NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING ZVI LOTKER, BOAZ PATT-SHAMIR, AND ADI ROSÉN Abstract. We consider the model of adversarial queuing theory for packet networks introduced by Borodin et al.
More informationScheduling Algorithms to Minimize Session Delays
Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of
More informationQoS-Enabled Video Streaming in Wireless Sensor Networks
QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical
More informationArchitecture Modeling and Analysis for Embedded Systems
Architecture Modeling and Analysis for Embedded Systems Overview of AADL and related research activities in RTG Oleg Sokolsky September 19, 2008 Overview Background Architecture description languages Embedded
More informationClustering-Based Distributed Precomputation for Quality-of-Service Routing*
Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,
More informationUltra-Low Latency Shaper
Ultra-Low Latency Shaper Christian Boiger christian.boiger@fh-deggendorf.de IEEE 802 Plenary July 2011 San Francisco, CA 1 Why Is a Ultra-Low Latency Class Necessary? Current priority of traffic classes
More informationRouting Algorithms, Process Model for Quality of Services (QoS) and Architectures for Two-Dimensional 4 4 Mesh Topology Network-on-Chip
Routing Algorithms, Process Model for Quality of Services (QoS) and Architectures for Two-Dimensional 4 4 Mesh Topology Network-on-Chip Nauman Jalil, Adnan Qureshi, Furqan Khan, and Sohaib Ayyaz Qazi Abstract
More informationNested QoS: Providing Flexible Performance in Shared IO Environment
Nested QoS: Providing Flexible Performance in Shared IO Environment Hui Wang Peter Varman hw5@rice.edu pjv@rice.edu Rice University, USA Abstract The increasing popularity of storage and server consolidation
More informationReal-Time Medical Data over WLANs
2015 International Conference on Computational Science and Computational Intelligence Real-Time Medical Data over WLANs Constantine Coutras Department of Computer Science Montclair State University Montclair,
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 6.1: Internetworking Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer
More informationQUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi
QUALITY OF SERVICE EVALUATION IN IEEE 802.15.4 NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi *M.Tech. (ECE) in Deptt. of ECE at CET,Moradabad, U.P., India **Assistant professor in Deptt. of ECE at CET, Moradabad,
More informationFull Duplex Switched Ethernet for Next Generation 1553B -based Applications
Full Duplex Switched Ethernet for Next Generation 1553B -based Applications Ahlem Mifdaoui Toulouse University ENSICA 1 place Emile Blouin 31056 Toulouse, France Ahlem.Mifdaoui@ensica.fr Fabrice Frances
More informationScheduling with Bus Access Optimization for Distributed Embedded Systems
472 IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 8, NO. 5, OCTOBER 2000 Scheduling with Bus Access Optimization for Distributed Embedded Systems Petru Eles, Member, IEEE, Alex
More informationEvaluation of NOC Using Tightly Coupled Router Architecture
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. II (Jan Feb. 2016), PP 01-05 www.iosrjournals.org Evaluation of NOC Using Tightly Coupled Router
More informationQoS Configuration. Overview. Introduction to QoS. QoS Policy. Class. Traffic behavior
Table of Contents QoS Configuration 1 Overview 1 Introduction to QoS 1 QoS Policy 1 Traffic Policing 2 Congestion Management 3 Line Rate 9 Configuring a QoS Policy 9 Configuration Task List 9 Configuring
More informationCS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007
CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question
More informationCSMA based Medium Access Control for Wireless Sensor Network
CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because
More information10. Network dimensioning
Partly based on slide material by Samuli Aalto and Jorma Virtamo ELEC-C7210 Modeling and analysis of communication networks 1 Contents Introduction Parameters: topology, routing and traffic Dimensioning
More informationCongestion Control Open Loop
Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental
More informationNetworked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang
Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application Ling Wang ling.wang2@wayne.edu Outline Introduction Parameterization Differentiation Evaluation
More informationMixed Criticality Scheduling in Time-Triggered Legacy Systems
Mixed Criticality Scheduling in Time-Triggered Legacy Systems Jens Theis and Gerhard Fohler Technische Universität Kaiserslautern, Germany Email: {jtheis,fohler}@eit.uni-kl.de Abstract Research on mixed
More informationQUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose
QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,
More informationWireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) Fair Queueing
Wireless Networks (CSC-7602) Lecture 8 (22 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark Fair Queueing 2 Today Wireline Queue Drop Wireless Queue Drop 3 Types of Congestion Control Strategies
More informationInternetworking Wireless Nodes to A Control Area Network
Internetworking Wireless Nodes to A Control Area Network A. Kutlu, H. Ekiz, M.D. Baba, E.T. Powner School of Engineering University of Sussex Brighton U.K. ABSTRACT This paper discusses the design and
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationLecture Outline. Bag of Tricks
Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information
More informationAn Efficient Implementation of Burst Fair Queuing for ATM Networking
An Efficient Implementation of Burst Fair Queuing for ATM Networking Anthony T. Chronopoulos, Caimu Tang Abstract Fair queueing, which was developed in last decade and was aimed at general packet switching
More informationModule 17: "Interconnection Networks" Lecture 37: "Introduction to Routers" Interconnection Networks. Fundamentals. Latency and bandwidth
Interconnection Networks Fundamentals Latency and bandwidth Router architecture Coherence protocol and routing [From Chapter 10 of Culler, Singh, Gupta] file:///e /parallel_com_arch/lecture37/37_1.htm[6/13/2012
More informationA Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing
A Time-To-Live Based Reservation Algorithm on Fully Decentralized Resource Discovery in Grid Computing Sanya Tangpongprasit, Takahiro Katagiri, Hiroki Honda, Toshitsugu Yuba Graduate School of Information
More informationAn optically transparent ultra high speed LAN-ring employing OTDM
An optically transparent ultra high speed LAN-ring employing OTDM K. Bengi, G. Remsak, H.R. van As Vienna University of Technology, Institute of Communication Networks Gusshausstrasse 25/388, A-1040 Vienna,
More information2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006
2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,
More informationFrom ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?
Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get
More information