415 research outputs found
Recommended from our members
Performance analysis of an ATM network with multimedia traffic: a simulation study
Traffic and congestion control are important in enabling ATM networks to maintain the Quality of Service (QoS) required by end users. A Call Admission Control (CAC) strategy ensures that the network has sufficient resources available at the start of each call, but this does not prevent a traffic source from violating the negotiated contract. A policing strategy (User Parameter Control (UPC)) is also required to enforce the negotiated rates for a particular connection and to protect conforming users from network overload.
The aim of this work is to investigate traffic policing and bandwidth management at the User to Network Interface (UNI). A policing function is proposed which is based on the leaky bucket (LB) which offers improved performance for both real time (RT) traffic such as speech and video and non-real time (non-RT) traffic, mainly data by taking into account the QoS requirements. A video cell in violation of the negotiated bit rate causes the remainder of the slice to be discarded. This 'tail clipping' provides protection for the decoder from damaged video slices. Speech cells are coded using a frequency domain coder, which places the most significant bits of a double speech sample into a high priority cell and the least significant bits into a high priority cell. In the case of congestion, the low priority cell can be discarded with little impact on the intelligibility of the received speech. However, data cells require loss-free delivery and are buffered rather than being discarded or tagged for subsequent deletion. This triple strategy is termed the super leaky bucket (SLB).
Separate queues for RT and non-RT traffic, are also proposed at the multiplexer, with non pre-emptive priority service for RT traffic if the queue exceeds a predetermined threshold. If the RT queue continues to grow beyond a second threshold, then all low priority cells (mainly speech) are discarded. This scheme protects non-RT traffic from being tagged and subsequently discarded, by queueing the cells and also by throttling back non-RT sources during periods of congestion. It also prevents the RT cells from being delayed excessively in the multiplexer queue.
A simulation model has been designed and implemented to test the proposal. Realistic sources have been incorporated into the model to simulate the types of traffic which could be expected on an ATM network.
The results show that the S-LB outperforms the standard LB for video cells. The number of cells discarded and the resulting number of damaged video slices are significantly reduced. Dual queues with cyclic service at the multiplexer also reduce the delays experienced by RT cells. The QoS for all categories of traffic is preserved
Design techniques for low-power systems
Portable products are being used increasingly. Because these systems are battery powered, reducing power consumption is vital. In this report we give the properties of low-power design and techniques to exploit them on the architecture of the system. We focus on: minimizing capacitance, avoiding unnecessary and wasteful activity, and reducing voltage and frequency. We review energy reduction techniques in the architecture and design of a hand-held computer and the wireless communication system including error control, system decomposition, communication and MAC protocols, and low-power short range networks
Investigation of delay jitter of heterogeneous traffic in broadband networks
Scope and Methodology of Study: A critical challenge for both wired and wireless networking vendors and carrier companies is to be able to accurately estimate the quality of service (QoS) that will be provided based on the network architecture, router/switch topology, and protocol applied. As a result, this thesis focuses on the theoretical analysis of QoS parameters in term of inter-arrival jitter in differentiated services networks by deploying analytic/mathematical modeling technique and queueing theory, where the analytic model is expressed in terms of a set of equations that can be solved to yield the desired delay jitter parameter. In wireless networks with homogeneous traffic, the effects on the delay jitter in reference to the priority control scheme of the ARQ traffic for the two cases of: 1) the ARQ traffic has a priority over the original transmission traffic; and 2) the ARQ traffic has no priority over the original transmission traffic are evaluated. In wired broadband networks with heterogeneous traffic, the jitter analysis is conducted and the algorithm to control its effect is also developed.Findings and Conclusions: First, the results show that high priority packets always maintain the minimum inter-arrival jitter, which will not be affected even in heavy load situation. Second, the Gaussian traffic modeling is applied using the MVA approach to conduct the queue length analysis, and then the jitter analysis in heterogeneous broadband networks is investigated. While for wireless networks with homogeneous traffic, binomial distribution is used to conduct the queue length analysis, which is sufficient and relatively easy compared to heterogeneous traffic. Third, develop a service discipline called the tagged stream adaptive distortion-reducing peak output-rate enforcing to control and avoid the delay jitter increases without bound in heterogeneous broadband networks. Finally, through the analysis provided, the differential services, was proved not only viable, but also effective to control delay jitter. The analytic models that serve as guidelines to assist network system designers in controlling the QoS requested by customer in term of delay jitter
MSFC Skylab instrumentation and communication system mission evaluation
An evaluation of the in-orbit performance of the instrumentation and communications systems installed on Skylab is presented. Performance is compared with functional requirements and the fidelity of communications. In-orbit performance includes processing engineering, scientific, experiment, and biomedical data, implementing ground-generated commands, audio and video communication, generating rendezvous ranging information, and radio frequency transmission and reception. A history of the system evolution based on the functional requirements and a physical description of the launch configuration is included. The report affirms that the instrumentation and communication system satisfied all imposed requirements
Implications of Implementing HDTV Over Digital Subscriber Line Networks
This thesis addresses the different challenges a telecommunications company would face when trying to implement an HDTV video service over a Digital Subscriber Line (DSL) connection. Each challenge is discussed in detail and a technology, protocol, or method is suggested to overcome that particular challenge.
One of the biggest challenges is creating a network architecture that can provide enough bandwidth to support video over a network that was originally designed for voice traffic. The majority of the network connections to a customer premises in a telephony network consists of a copper pair. This type of connection is not optimal for high bandwidth services. This limitation can be overcome using Gigabit Ethernet (GE) over fiber in the core part of the network and VDSL2 in the access part of the network. For the purposes of this document, the core portion of the network is considered to be an area equal to several counties or approximately 50 miles in radius. The core network starts at the primary central office (CO) and spreads out to central offices in suburbs and small towns. The primary central office is a central point in the telecom operator\u27s network. Large trunks are propagated from the primary central office to smaller central offices making up the core network. The access portion of the network is considered to be an area within a suburb or small town from the central office to a subscriber\u27s home. Appendix A, located on page 60, contains a network diagram illustrating the scope of each of the different portions of the network. Considerations must also be given for the internal network to the residence such as category 5 (Cat5) cable or higher grade and network equipment that can provide up to 30 Megabits per second (Mbps) connections or throughput.
The equipment in the telecommunications network also plays a part in meeting the challenge of 30 Mbps bandwidth. GE switches should be used with single mode fiber optic cable in the core part of the network. Digital Subscriber Line Access Multiplexers (DSLAM) with the capability to filter Internet Group Management Protocol (IGMP) messages should be used in the access part of the network to facilitate bandwidth utilization. Placement of this equipment and how the data is aggregated is another issue to consider when implementing HDTV service.
Another major challenge facing the implementation of HDTV over DSL networks is controlling quality of service (QoS) throughout the network. Class of Service (CoS) and Differentiated Services (DiffServ) is a method of QoS that would enable video packets to have a higher priority and less delay than other data packets. The consumer could have data, video, and voice traffic all over the same DSL connection. Data, video and voice packets would need to have a different priority in order to maintain appropriate QoS levels for each service.
The use of advanced technology in video encoding will be essential to the success of the video service. MPEG-2, MPEG-4, and Windows Media 9 are just a few of the video encoding technologies that could be used to reduce the necessary bandwidth for HDTV. The advancement of this technology is essential to allow telecommunications providers to offer HDTV. Another challenge for the telecom operator concerns the security of the network and service after implementation. Theft of service will be another area that the telecomm operator will be forced to resolve. The cable operators currently face this issue and lose millions of dollars in revenue. Authentication, IP filtering and MAC address blocking are a few possible solutions to this problem
- âŠ