Network Traffic Characterisation

Size: px
Start display at page:

Download "Network Traffic Characterisation"

Transcription

1 Modeling Modeling Theory

2 Outline 1 2 The Problem Assumptions 3 Standard Car Model The Packet Train Model The Self - Similar Model 4 Random Variables and Stochastic Processes The Poisson and Exponential Distributions Fractals References

3 Traffic Flow - Importance Modelling traffic flow can be seen to be important for a variety of reasons Understanding as an aid in understanding fundamental characteristics of networks Simulation as input to simulations employed to assist in: evaluating protocol behaviour predicting how a network will behave under general conditions predicting how a network will behave under extreme conditions...

4 Problem and Features The Problem Assumptions Problem: How to model traffic flow for a given network at a router. Features: packet/cell arrivals packet/cell buffering packet/cell departures quality of service - priorities multiplexing behaviour determinate, indeterminate, bursty time...

5 Assumptions The Problem Assumptions We will consider the case of packet/cell arrivals Assumptions: packets/cells will be of same length packet arrival times will be independent of each other ignore packet/cell buffering ignore packet/cell departures ignore quality of service - priorities ignore multiplexing issues assume behaviour indeterminate and so probabalistic in nature, so arrival times will be random non bursty

6 Question The Problem Assumptions What if we assume that arrival times are deterministic?

7 Characteristics The Problem Assumptions Traffic flow is a non-deterministic concept. By this we mean that we cannot guarantee that we can observe traffic at a particular point in space and time. However we can talk about the likelihood, the probability, of traffic being observed. For events occuring randomly in space and time we (traditionally) first explore the suitability of the Poisson distribution.

8 Arrivals The Problem Assumptions Network traffic can be modelled as a sequence of arrivals of packets or cells leading to counting processes as a sequence of arrivals of packets or cells leading to interarrival time processes.

9 Car Model Standard Car Model The Packet Train Model The Self - Similar Model The standard Car Model employs the Poisson distribution. This is motivated by it s use in the telephony model (A. K. Erlang). The Poisson distribution is often used for describing events: that can occur in randomly in both time and space as single independent objects Here the event being considered is the arrival of single unpredictable, independent packets at a router Poisson models are examples of counting processes. In our model the count involved will relate to the number of packets that arrive in a given time interval

10 Standard Car Model The Packet Train Model The Self - Similar Model Testing Results against the Car (Poisson) Distribution The χ 2 Test Comparing Histograms for the interarrival times against a decreasing exponential distribution

11 Findings Standard Car Model The Packet Train Model The Self - Similar Model The car model fails to predict natwork traffic behaviour under bursty conditions can be improved using compound Poisson distributions for the batch size and batch arrival times the packet train model the self-similar model We consider the packet train model and the self similar model.

12 Packet Train Model Standard Car Model The Packet Train Model The Self - Similar Model Assumptions Groups of packets travel together packet sizes are limited to available buffer size and backward compatibility file sizes are getting larger, resulting in greater numbers of smaller packets, hence trains of packets between a sender and receiver arrive at routers routing decisions can be made at the head of the train with no routing overhead for the rest of the train

13 Packet Train Model Standard Car Model The Packet Train Model The Self - Similar Model Model trains are grouped together by comparing interarrival times for cars. These are less than a selected maximum value M adjacent cars with interarrival times greater than the maximum allowed time belong to different trains interarrival times between cars must be smaller than interarrival times between trains the direction of communication sender A to receiver B and sender B to receiver A are immaterial

14 Findings Standard Car Model The Packet Train Model The Self - Similar Model The Train model addresses bursty shortcomings of Poisson model (see last comment) found to be particularly applicable in some (for example) star topology networks not widely employed for LAN or WAN networks does not address multiple time scale burstiness of internet traffic data We consider the self similar model.

15 Self - Similar Model Standard Car Model The Packet Train Model The Self - Similar Model The self - similar model Poisson model applicable for data with limited variability in time and space and no or limited negligible burstiness data networks have been found to exhibit high/extreme variability large variability in space and time tends to cause associated traffic to exhibit fractal behaviour, by which we mean that some statistical proerties (relating to burstiness) repeat themselves at various time scales

16 Random Variable Random Variables and Stochastic Processes The Poisson and Exponential Distributions Fractals References Definition Random variables are functions X t :Ω R with an associated probability distribution defined on each outcome or alternatively element in Ω. Id the number of possible values that X can take is finite or countably infinite, then the variable is said to be a discrete random variable. Otherwise we describe the random variable as a continuous random varaible. Definition A counting Process is a discrete random variable that takes values in N

17 Stochastic Processes Random Variables and Stochastic Processes The Poisson and Exponential Distributions Fractals References Definition A Stochastic Process is a family {X t } t R + of Random Variables X t that vary with respect to time. So we have a collection of rendom variable that for our purposes describe traffic flow for a given region of a network.

18 Poisson Distribution Random Variables and Stochastic Processes The Poisson and Exponential Distributions Fractals References Definition A random variable X is said to have the Poisson distribution with mean λ 0if r N P(X = r) = λr r! e r

19 The Exponential Distribution Random Variables and Stochastic Processes The Poisson and Exponential Distributions Fractals References Definition A random variable X is said to be exponentially distributed with parameter λ>0 if its pdf (probability density function) is given by x R + {0}, f (x) =λe λx and zero otherwise

20 Fractal Random Variables and Stochastic Processes The Poisson and Exponential Distributions Fractals References Definition Fractals are sets, which, when magnified over and over again,always resmble the original image. For pictures of Julia sets nd Mandelbrots, the dark regions represent non chaotic points, the coloured regions divergence to infinity and the interface between - chaos.

21 References Random Variables and Stochastic Processes The Poisson and Exponential Distributions Fractals References [1] J. Banks et al, Discrete-Event System Simulation, Prentice Hall, [2] Michela Bechi, From Poisson Processes to Self-Similarity: A Survey of Network Traffic Models, http : // jain/cse567 06/ftp/traffic m odels1/index.html [3] Robert L. Devaney, A First Course in Chaotic Dynamical Systems, Perseus Books, 1992.

Read Chapter 4 of Kurose-Ross

Read Chapter 4 of Kurose-Ross CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures

More information

Teletraffic theory (for beginners)

Teletraffic theory (for beginners) Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

Advanced Internet Technologies

Advanced Internet Technologies Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/

More information

TELCOM 2130 Queueing Theory. David Tipper Associate Professor Graduate Telecommunications and Networking Program. University of Pittsburgh

TELCOM 2130 Queueing Theory. David Tipper Associate Professor Graduate Telecommunications and Networking Program. University of Pittsburgh TELCOM 2130 Queueing Theory David Tipper Associate Professor Graduate Telecommunications and Networking Program University of Pittsburgh Learning Objective To develop the modeling and mathematical skills

More information

Resource Allocation and Queuing Theory

Resource Allocation and Queuing Theory and Modeling Modeling Networks Outline 1 Introduction Why are we waiting?... 2 Packet-Switched Network Connectionless Flows Service Model Router-Centric versus Host-Centric Reservation Based versus Feedback-Based

More information

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012 Queuing Systems Queuing theory establishes a powerful tool in modeling and performance analysis of many complex systems, such as computer networks, telecommunication systems, call centers, manufacturing

More information

EP2200 Queueing theory and teletraffic systems

EP2200 Queueing theory and teletraffic systems EP2200 Queueing theory and teletraffic systems Viktoria Fodor Laboratory of Communication Networks School of Electrical Engineering Lecture 1 If you want to model networks Or a complex data flow A queue's

More information

EP2200 Queueing theory and teletraffic systems

EP2200 Queueing theory and teletraffic systems EP2200 Queueing theory and teletraffic systems Viktoria Fodor Laboratory of Communication Networks School of Electrical Engineering Lecture 1 If you want to model networks Or a complex data flow A queue's

More information

Application of Importance Sampling in Simulation of Buffer Policies in ATM networks

Application of Importance Sampling in Simulation of Buffer Policies in ATM networks Application of Importance Sampling in Simulation of Buffer Policies in ATM networks SAMAD S. KOLAHI School of Computing and Information Systems Unitec New Zealand Carrington Road, Mt Albert, Auckland NEW

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

Scientific Computing: An Introductory Survey

Scientific Computing: An Introductory Survey Scientific Computing: An Introductory Survey Chapter 13 Random Numbers and Stochastic Simulation Prof. Michael T. Heath Department of Computer Science University of Illinois at Urbana-Champaign Copyright

More information

A Quality of Service Decision Model for ATM-LAN/MAN Interconnection

A Quality of Service Decision Model for ATM-LAN/MAN Interconnection A Quality of Service Decision for ATM-LAN/MAN Interconnection N. Davies, P. Francis-Cobley Department of Computer Science, University of Bristol Introduction With ATM networks now coming of age, there

More information

A Rant on Queues. Van Jacobson. July 26, MIT Lincoln Labs Lexington, MA

A Rant on Queues. Van Jacobson. July 26, MIT Lincoln Labs Lexington, MA A Rant on Queues Van Jacobson July 26, 2006 MIT Lincoln Labs Lexington, MA Unlike the phone system, the Internet supports communication over paths with diverse, time varying, bandwidth. This means we often

More information

Teletraffic theory I: Queuing theory

Teletraffic theory I: Queuing theory Teletraffic theory I: Queuing theory Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2716/ 1. Place of the course TLT-2716 is a part of Teletraffic theory five

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Introduction to the course

Introduction to the course Introduction to the course Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/ moltchan/modsim/ http://www.cs.tut.fi/kurssit/tlt-2706/ 1. What is the teletraffic theory? Multidisciplinary

More information

Fundamentals of Queueing Models

Fundamentals of Queueing Models Fundamentals of Queueing Models Michela Meo Maurizio M. Munafò Michela.Meo@polito.it Maurizio.Munafo@polito.it TLC Network Group - Politecnico di Torino 1 Modeling a TLC network Modelization and simulation

More information

Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks. Lecture 3: Tuesday, 23rd January 2007

Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks. Lecture 3: Tuesday, 23rd January 2007 Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks Lecture 3: Tuesday, 23rd January 2007 Instructor: Soma Chaudhuri Scribe: Abhishek Sinha 1 Introduction The lecture can

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

A Study of Adaptive Rate Algorithm in ATM Network Flow Control

A Study of Adaptive Rate Algorithm in ATM Network Flow Control A Study of Adaptive Rate Algorithm in ATM Network Flow Control Surasee Prahmkaew and Chanintorn Jittawiriyanukoon Faculty of Science and Technology Assumption University, Bangkok, Thailand Abstract In

More information

Traffic Analysis and Modeling of Real World Video Encoders

Traffic Analysis and Modeling of Real World Video Encoders Traffic Analysis and Modeling of Real World Video Encoders KLIMIS NTALIANIS, NIKOLAOS DOULAMIS, ANASTASIOS DOULAMIS AND STEFANOS KOLLIAS Department of Electrical and Computer Engineering National Technical

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Website.

Website. Admin stuff Questionnaire Name Email Math courses taken so far General academic trend (major) General interests What about Chaos interests you the most? What computing experience do you have? Website www.cse.ucsc.edu/classes/ams146/spring05/index.html

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

the past doesn t impact the future!

the past doesn t impact the future! Memoryless property: suppose time between session arrivals Z is exponentially distributed note: Pr{Z >y} = y be bt dt = e by suppose a session has not arrived for y seconds what is the probability that

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

Discrete Event (time) Simulation

Discrete Event (time) Simulation Discrete Event (time) Simulation What is a simulation? Simulation is the process of designing a model of a real system and conducting experiments with this model for the purpose either of understanding

More information

UNIT 4: QUEUEING MODELS

UNIT 4: QUEUEING MODELS UNIT 4: QUEUEING MODELS 4.1 Characteristics of Queueing System The key element s of queuing system are the customer and servers. Term Customer: Can refer to people, trucks, mechanics, airplanes or anything

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Using OPNET to Enhance Student Learning in a Data Communications

Using OPNET to Enhance Student Learning in a Data Communications Using OPNET to Enhance Student Learning in a Data Communications Course Michael W Dixon Murdoch University, Perth, Australia m.dixon@murdoch.edu.au Terry W Koziniec Murdoch University, Perth, Australia

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING

A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING Timothy D. Neame,l Moshe Zukerman 1 and Ronald G. Addie2 1 Department of Electrical and 2 Department of Mathematics Electronic Engineering, and Computer

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

Self Similar Network Traffic present by Carl Minton. Definition of Self Similarity

Self Similar Network Traffic present by Carl Minton. Definition of Self Similarity Self Similar Network Traffic present by Carl Minton Agenda Definition of self similarity Quantifying self similarity Self similarity of network traffic Implications for network performance Pointers for

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

Performance of Telecommunication Networks

Performance of Telecommunication Networks MONASH UNIVERSITY DEPARTMENT OF ELECTRICAL & COMPUTER SYSTEMS ENGINEERING Performance of Telecommunication Networks Experiment IV: Delay and Queueing in Packet Switching Networks Y. Ahmet Şekercioğlu Aims

More information

Trace Traffic Integration into Model-Driven Simulations

Trace Traffic Integration into Model-Driven Simulations Trace Traffic Integration into Model-Driven Simulations Sponsor: Sprint Kert Mezger David W. Petr Technical Report TISL-10230-10 Telecommunications and Information Sciences Laboratory Department of Electrical

More information

Using Queuing theory the performance measures of cloud with infinite servers

Using Queuing theory the performance measures of cloud with infinite servers Using Queuing theory the performance measures of cloud with infinite servers A.Anupama Department of Information Technology GMR Institute of Technology Rajam, India anupama.a@gmrit.org G.Satya Keerthi

More information

A VERIFICATION OF SELECTED PROPERTIES OF TELECOMMUNICATION TRAFFIC GENERATED BY OPNET SIMULATOR.

A VERIFICATION OF SELECTED PROPERTIES OF TELECOMMUNICATION TRAFFIC GENERATED BY OPNET SIMULATOR. UNIVERSITY OF LJUBLJANA Faculty of Electrical Engineering Daniel Alonso Martinez A VERIFICATION OF SELECTED PROPERTIES OF TELECOMMUNICATION TRAFFIC GENERATED BY OPNET SIMULATOR. Erasmus exchange project

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

Some economical principles

Some economical principles Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Some economical principles Assume users have

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Queuing Networks Modeling Virtual Laboratory

Queuing Networks Modeling Virtual Laboratory Queuing Networks Modeling Virtual Laboratory Dr. S. Dharmaraja Department of Mathematics IIT Delhi http://web.iitd.ac.in/~dharmar Queues Notes 1 1 Outline Introduction Simple Queues Performance Measures

More information

Module 17: "Interconnection Networks" Lecture 37: "Introduction to Routers" Interconnection Networks. Fundamentals. Latency and bandwidth

Module 17: Interconnection Networks Lecture 37: Introduction to Routers Interconnection Networks. Fundamentals. Latency and bandwidth Interconnection Networks Fundamentals Latency and bandwidth Router architecture Coherence protocol and routing [From Chapter 10 of Culler, Singh, Gupta] file:///e /parallel_com_arch/lecture37/37_1.htm[6/13/2012

More information

Chapter 16. Microscopic Traffic Simulation Overview Traffic Simulation Models

Chapter 16. Microscopic Traffic Simulation Overview Traffic Simulation Models Chapter 6 Microscopic Traffic Simulation 6. Overview The complexity of traffic stream behaviour and the difficulties in performing experiments with real world traffic make computer simulation an important

More information

Capacity planning and.

Capacity planning and. Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Some economical principles Assume users have

More information

Text Book. 1. Computer Networks & Internets by Douglas E Comer. 2. Data and Computer Communication by William Stalling, 5th or above edition.

Text Book. 1. Computer Networks & Internets by Douglas E Comer. 2. Data and Computer Communication by William Stalling, 5th or above edition. 1 Text Book 1. Computer Networks & Internets by Douglas E Comer. 2. Data and Computer Communication by William Stalling, 5th or above edition. 2 Marks distribution Topic no First Mid 20 1,2,3 Second Mid

More information

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 9 November 12, 2018 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2018-2019 Medium Access Control Scheduled access Classification of wireless

More information

EECS 454: Modeling and Analysis of Communication Networks

EECS 454: Modeling and Analysis of Communication Networks : Modeling and Analysis of Communication Networks Spring Quarter 2008 Meeting time: 12:30-1:50 MW Instructor: Randall Berry Office: Tech, Rm. M318 Office Hours: by appointment Course Overview Primary goal

More information

Nonlinear Complex Behaviour of TCP in UMTS Networks and Performance Analysis

Nonlinear Complex Behaviour of TCP in UMTS Networks and Performance Analysis Nonlinear Complex Behaviour of TCP in UMTS Networks and Performance Analysis I.Vasalos, R.A.Carrasco, W.L.Woo University of Newcastle upon Tyne, England Abstract: This paper presents a study of nonlinear

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Queueing Networks. Lund University /

Queueing Networks. Lund University / Queueing Networks Queueing Networks - Definition A queueing network is a network of nodes in which each node is a queue The output of one queue is connected to the input of another queue We will only consider

More information

Performance Evaluation. of Input and Virtual Output Queuing on. Self-Similar Traffic

Performance Evaluation. of Input and Virtual Output Queuing on. Self-Similar Traffic Page 1 of 11 CS 678 Topics in Internet Research Progress Report Performance Evaluation of Input and Virtual Output Queuing on Self-Similar Traffic Submitted to Zartash Afzal Uzmi By : Group # 3 Muhammad

More information

Chapters 1, 2 & 3: A Brief Introduction. Barry L. Nelson Northwestern University July 2017

Chapters 1, 2 & 3: A Brief Introduction. Barry L. Nelson Northwestern University July 2017 Chapters 1, 2 & 3: A Brief Introduction Barry L. Nelson Northwestern University July 2017 1 Why do we simulate? We typically choose to simulate a dynamic, stochastic system when the performance measure

More information

Digital Communication Networks

Digital Communication Networks Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus

More information

What We ll Do... Random

What We ll Do... Random What We ll Do... Random- number generation Random Number Generation Generating random variates Nonstationary Poisson processes Variance reduction Sequential sampling Designing and executing simulation

More information

Random Graph Model; parameterization 2

Random Graph Model; parameterization 2 Agenda Random Graphs Recap giant component and small world statistics problems: degree distribution and triangles Recall that a graph G = (V, E) consists of a set of vertices V and a set of edges E V V.

More information

Dimensioning Links for IP Telephony

Dimensioning Links for IP Telephony Dimensioning Links for IP Telephony Ian Marsh (SICS/KTH) Bengt Ahlgren, Anders Andersson (SICS) Olof Hagsand (Dynarc) ianm@sics.se Columbia University, USA Monday 2nd April, 2001 http://www.sics.se/ ianm/talks/columbia.

More information

Measurement of packet networks, e.g. the internet

Measurement of packet networks, e.g. the internet Measurement of packet networks, e.g. the internet John Schormans (EE) Ben Parker (SMS) (next speaker in this joint talk) and Steven Gilmour (SMS Head of the Statistics Research Group and Director for the

More information

BANK ATM QUEUEING MODEL: A CASE STUDY Ashish Upadhayay* 1

BANK ATM QUEUEING MODEL: A CASE STUDY Ashish Upadhayay* 1 ISSN 2277-2685 IJESR/May 2017/ Vol-7/Issue-5/40-45 Ashish Upadhayay / International Journal of Engineering & Science Research BANK ATM QUEUEING MODEL: A CASE STUDY Ashish Upadhayay* 1 1 Research Scholar,

More information

TCP performance analysis through. processor sharing modeling

TCP performance analysis through. processor sharing modeling TCP performance analysis through processor sharing modeling Pasi Lassila a,b, Hans van den Berg a,c, Michel Mandjes a,d, and Rob Kooij c a Faculty of Mathematical Sciences, University of Twente b Networking

More information

Resource Sharing for QoS in Agile All Photonic Networks

Resource Sharing for QoS in Agile All Photonic Networks Resource Sharing for QoS in Agile All Photonic Networks Anton Vinokurov, Xiao Liu, Lorne G Mason Department of Electrical and Computer Engineering, McGill University, Montreal, Canada, H3A 2A7 E-mail:

More information

Modeling and Simulation (An Introduction)

Modeling and Simulation (An Introduction) Modeling and Simulation (An Introduction) 1 The Nature of Simulation Conceptions Application areas Impediments 2 Conceptions Simulation course is about techniques for using computers to imitate or simulate

More information

Chapter 6 Connecting Device

Chapter 6 Connecting Device Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks

More information

Congestion Control in TCP

Congestion Control in TCP Congestion Control in TCP Antonio Carzaniga Faculty of Informatics University of Lugano May 6, 2005 Outline Intro to congestion control Input rate vs. output throughput Congestion window Congestion avoidance

More information

Internet Architecture and Protocol

Internet Architecture and Protocol Internet Architecture and Protocol Set# 04 Wide Area Networks Delivered By: Engr Tahir Niazi Wide Area Network Basics Cover large geographical area Network of Networks WANs used to be characterized with

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

Computer Networks Chapter 4: Medium Access Control (MAC)

Computer Networks Chapter 4: Medium Access Control (MAC) Computer Networks Chapter 4: Medium Access Control (MAC) Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter The medium access problem and main options for solutions Understand

More information

Deadline-Based Scheduling in Support of Real-Time Data Delivery

Deadline-Based Scheduling in Support of Real-Time Data Delivery Deadline-Based Scheduling in Support of Real-Time Data Delivery Yanni Ellen Liu Department of Computer Science University of Manitoba Winnipeg, Manitoba, Canada R3T 2N2 yliu@cs.umanitoba.ca Johnny W. Wong

More information

Multi-threaded, discrete event simulation of distributed computing systems

Multi-threaded, discrete event simulation of distributed computing systems Multi-threaded, discrete event simulation of distributed computing systems Iosif C. Legrand California Institute of Technology, Pasadena, CA, U.S.A Abstract The LHC experiments have envisaged computing

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information

On TCP friendliness of VOIP traffic

On TCP friendliness of VOIP traffic On TCP friendliness of VOIP traffic By Rashmi Parthasarathy WSU ID # 10975537 A report submitted in partial fulfillment of the requirements of CptS 555 Electrical Engineering and Computer Science Department

More information

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,

More information

NetWare Link-Services Protocol

NetWare Link-Services Protocol 44 CHAPTER Chapter Goals Describe the Network Link-Service Protocol. Describe routing with NLSP. Describe the data packet used by NLSP. Background The (NLSP) is a link-state routing protocol from Novell

More information

Non-Parametric Modeling

Non-Parametric Modeling Non-Parametric Modeling CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Introduction Non-Parametric Density Estimation Parzen Windows Kn-Nearest Neighbor

More information

Time-Step Network Simulation

Time-Step Network Simulation Time-Step Network Simulation Andrzej Kochut Udaya Shankar University of Maryland, College Park Introduction Goal: Fast accurate performance evaluation tool for computer networks Handles general control

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

You have to remember that

You have to remember that Review You have to remember that Circuit Switched Network Packet Switched Network To install Dynagen & Dynamips To find a idlepc value To Set up a Router Various Command Contents IP Internetworking Internet

More information

Communication and Networks. Problems

Communication and Networks. Problems Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes

More information

Knowledge-Defined Networking: Towards Self-Driving Networks

Knowledge-Defined Networking: Towards Self-Driving Networks Knowledge-Defined Networking: Towards Self-Driving Networks Albert Cabellos (UPC/BarcelonaTech, Spain) albert.cabellos@gmail.com 2nd IFIP/IEEE International Workshop on Analytics for Network and Service

More information

Formal Modeling and Analysis of Stream Processing Systems

Formal Modeling and Analysis of Stream Processing Systems Formal Modeling and Analysis of Stream Processing Systems Linh T.X. Phan March 2009 Computer and Information Science University of Pennsylvania 1 High performance Highly optimized requirements systems

More information

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Leah Rosenbaum Mohit Agrawal Leah Birch Yacoub Kureh Nam Lee UCLA Institute for Pure and Applied

More information

Influence of Link State Update Algorithms on the Cost of QoS Path Computations

Influence of Link State Update Algorithms on the Cost of QoS Path Computations Influence of Link State Update Algorithms on the of QoS Path Computations Gonzalo Camarillo Advanced Signalling Research Laboratory Ericsson, FIN-0220 Jorvas, Finland Gonzalo.Camarillo@ericsson.com Abstract

More information

FEC Recovery Performance for Video Streaming Services Based on H.264/SVC

FEC Recovery Performance for Video Streaming Services Based on H.264/SVC 20 FEC Recovery Performance for Video Streaming Services Based on H.264/SVC Kenji Kirihara, Hiroyuki Masuyama, Shoji Kasahara and Yutaka Takahashi Kyoto University Japan. Introduction With the recent advancement

More information

Traffic theory for the Internet and the future Internet

Traffic theory for the Internet and the future Internet Traffic theory for the Internet and the future Internet Orange Labs Jim Roberts, Research & Development 29 August 2008, MAS Seminar Internet traffic theory understanding the relationship between demand,

More information

Modelling data networks research summary and modelling tools

Modelling data networks research summary and modelling tools Modelling data networks research summary and modelling tools a 1, 3 1, 2 2, 2 b 0, 3 2, 3 u 1, 3 α 1, 6 c 0, 3 v 2, 2 β 1, 1 Richard G. Clegg (richard@richardclegg.org) December 2011 Available online at

More information

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2008

Name Student ID Department/Year. Midterm Examination. Introduction to Computer Networks Class#: 901 E31110 Fall 2008 Name Student ID Department/Year Midterm Examination Introduction to Computer Networks Class#: 901 E31110 Fall 2008 9:30-11:10 Tuesday November 11, 2008 Prohibited 1. You are not allowed to write down the

More information

Random Number Generators

Random Number Generators 1/17 Random Number Generators Professor Karl Sigman Columbia University Department of IEOR New York City USA 2/17 Introduction Your computer generates" numbers U 1, U 2, U 3,... that are considered independent

More information

An Information Theoretic Approach to Network Trace Compression

An Information Theoretic Approach to Network Trace Compression An Information Theoretic Approach to Network Trace Compression Yong Liu a, Don Towsley a, Jing Weng a, and Dennis Goeckel b a Computer Science, b Electrical & Computer Engineering, University of Massachusetts,

More information

Switched Network Latency Problems Solved

Switched Network Latency Problems Solved 1 Switched Network Latency Problems Solved A Lightfleet Whitepaper by the Lightfleet Technical Staff Overview The biggest limiter to network performance is the control plane the array of processors and

More information

An Investigation of Chaos Theory Using Supercomputing Techniques

An Investigation of Chaos Theory Using Supercomputing Techniques An Investigation of Chaos Theory Using Supercomputing Techniques Bryan Ward June 12, 2007 Abstract Chaos theory is the study of dynamic systems in which small differences in the environment, can create

More information

Onroad Vehicular Broadcast

Onroad Vehicular Broadcast Onroad Vehicular Broadcast Jesus Arango, Alon Efrat Computer Science Department University of Arizona Srinivasan Ramasubramanian, Marwan Krunz Electrical and Computer Engineering University of Arizona

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

DE62 TELECOMMUNICATION SWITCHING SYSTEMS DEC 2013

DE62 TELECOMMUNICATION SWITCHING SYSTEMS DEC 2013 Q.2 a. A 00 line exchange is to be designed using uniselectors and two motion selectors that provide a switching capacity of 20. Give your requirement of components and explain how you will implement this

More information