2,763 research outputs found
Quality of Service over Specific Link Layers: state of the art report
The Integrated Services concept is proposed as an enhancement to the current Internet architecture, to provide a better Quality of Service (QoS) than that provided by the traditional Best-Effort service. The features of the Integrated Services are explained in this report. To support Integrated Services, certain requirements are posed on the underlying link layer. These requirements are studied by the Integrated Services over Specific Link Layers (ISSLL) IETF working group. The status of this ongoing research is reported in this document. To be more specific, the solutions to provide Integrated Services over ATM, IEEE 802 LAN technologies and low-bitrate links are evaluated in detail. The ISSLL working group has not yet studied the requirements, that are posed on the underlying link layer, when this link layer is wireless. Therefore, this state of the art report is extended with an identification of the requirements that are posed on the underlying wireless link, to provide differentiated Quality of Service
ISDN at NASA Lewis Research Center
An expository investigation of the potential impact of the Integrated Services Digital Network (ISDN) at NASA Lewis Research Center is described. To properly frame the subject, the paper contains a detailed survey of the components of Narrowband ISDN. The principles and objectives are presented as decreed by the Consultative Committee for International Telephone and Telegraph (CCITT). The various channel types are delineated and their associated service combinations are described. The subscriber-access network functions are explained pictorially via the ISDN reference configuration. A section on switching techniques is presented to enable the reader to understand the emergence of the concept of fast packet switching. This new technology is designed to operate over the high bandwidth, low error rate transmission media that characterizes the LeRC environment. A brief introduction to the next generation of networks is covered with sections on Broadband ISDM (B-ISDN), Asynchronous Transfer Mode (ATM), and Synchronous Optical Networks (SONET). Applications at LeRC are presented, first in terms of targets of opportunity, then in light of compatibility constraints. In-place pilot projects and testing are described that demonstrate actual usage at LeRC
Energy-efficient wireless communication
In this chapter we present an energy-efficient highly adaptive network interface architecture and a novel data link layer protocol for wireless networks that provides Quality of Service (QoS) support for diverse traffic types. Due to the dynamic nature of wireless networks, adaptations in bandwidth scheduling and error control are necessary to achieve energy efficiency and an acceptable quality of service. In our approach we apply adaptability through all layers of the protocol stack, and provide feedback to the applications. In this way the applications can adapt the data streams, and the network protocols can adapt the communication parameters
Switching techniques in data-acquisition systems for future experiments
An overview of the current state of development of parallel event-building techniques is given, with emphasis of future applications in the high-rate experiments proposed at the Large Hadron Collider (LHC). The paper describes the ain architectural options in parallel event builders, the proposed event-building architectures for LHC experiments, and the use of standard net- working protocols for event building and their limitations. The main issues around the potential use of circuit switching, message switching and packet switching are examined. Results from various laboratory demonstrator systems are presented
Protocol security for third generation telecommunication systems
In this thesis, a novel protocol stack architecture is presented. The Future Core Networks System (FCNS) forms a secure reference model for use in packet-switched structures, with its applicability ranging from computer to telecommunication networks. An insight on currently used network protocol systems is given, analysing standardised sets of communication rules with respect to the security they afford to the messages exchanged. The lack of protection schemes for the internal protocol stack messages and the implementation pitfalls of their security architectures are described, in relation to the effects they have on the communication process. The OSI security model is also considered, with disadvantages identified in the placement of security functionality and its management. The drawbacks depicted for currently used systems form the motivation behind this work. The analysis of the FCNS follows, which is composed of three parts. In the first part, the FCNS communication layers are examined, with respect to the mechanisms used to establish, maintain and tear down a connection between peer entities. In the second part, the security mechanisms of the proposed reference architecture are given, including details on the FCNS keystream generator used for the security of the internal FCNS messages. Finally, the FCNS Error Protocol is depicted, illustrating the modes of operation and advantages it exhibits over currently used systems. The work then moves into presenting details of the software FCNS implementation, followed by the presentation of the results and measurements obtained by the case studies created. Comparisons are given in relation to the TCP/IP suite, to provide the means of identifying the FCNS applicability in various network environments. The work is concluded by presenting the FCNS functionality in delivering information for the UMTS, together with further work that may enhance the flexibility and use of the proposed architecture
Dynamic bandwidth allocation in ATM networks
Includes bibliographical references.This thesis investigates bandwidth allocation methodologies to transport new emerging bursty traffic types in ATM networks. However, existing ATM traffic management solutions are not readily able to handle the inevitable problem of congestion as result of the bursty traffic from the new emerging services. This research basically addresses bandwidth allocation issues for bursty traffic by proposing and exploring the concept of dynamic bandwidth allocation and comparing it to the traditional static bandwidth allocation schemes
Methods of Congestion Control for Adaptive Continuous Media
Since the first exchange of data between machines in different locations in early 1960s,
computer networks have grown exponentially with millions of people now using the
Internet. With this, there has also been a rapid increase in different kinds of services offered
over the World Wide Web from simple e-mails to streaming video. It is generally accepted
that the commonly used protocol suite TCP/IP alone is not adequate for a number of
modern applications with high bandwidth and minimal delay requirements. Many
technologies are emerging such as IPv6, Diffserv, Intserv etc, which aim to replace the onesize-fits-all approach of the current lPv4. There is a consensus that the networks will have
to be capable of multi-service and will have to isolate different classes of traffic through
bandwidth partitioning such that, for example, low priority best-effort traffic does not cause
delay for high priority video traffic. However, this research identifies that even within a
class there may be delays or losses due to congestion and the problem will require different
solutions in different classes.
The focus of this research is on the requirements of the adaptive continuous media
class. These are traffic flows that require a good Quality of Service but are also able to
adapt to the network conditions by accepting some degradation in quality. It is potentially
the most flexible traffic class and therefore, one of the most useful types for an increasing
number of applications.
This thesis discusses the QoS requirements of adaptive continuous media and
identifies an ideal feedback based control system that would be suitable for this class. A
number of current methods of congestion control have been investigated and two methods
that have been shown to be successful with data traffic have been evaluated to ascertain if
they could be adapted for adaptive continuous media. A novel method of control based on
percentile monitoring of the queue occupancy is then proposed and developed. Simulation
results demonstrate that the percentile monitoring based method is more appropriate to this
type of flow. The problem of congestion control at aggregating nodes of the network
hierarchy, where thousands of adaptive flows may be aggregated to a single flow, is then
considered. A unique method of pricing mean and variance is developed such that each
individual flow is charged fairly for its contribution to the congestion
Congestion control mechanisms within MPLS networks
PhDAbstract not availabl
Distributed Failure Restoration for Asynchronous Transfer Mode (ATM) Tactical Communication Networks
Asynchronous Transfer Mode (A TM) is an attractive choice for future military
communication systems because it can provide high throughput and support multi-service
applications. Furthermore its use is consistent with the 'off the shelf technology
policy that is currently operated by the Defence Engineering Research Agency of Great
Britain. However, A TM has been developed as a civil standard and is designed to
operate in network infrastructures with very low failure rates. In contrast, tactical
networks are much less reliable. Indeed tactical networks operate on the premise that
failures, particularly node failures, are expected. Hence, efficient, automatic failure
restoration schemes are essential if an A TM based tactical network is to remain
operational. The main objective of this research is the proposal and verification of one
or more new restoration algorithms that meet the specific requirements of tactical
networks.
The aspects of ATM networks that influence restoration algorithms' implementation are
discussed. In particular, the features of A TM networks such as the concept of Virtual
Paths Virtual Channels and OAM (Operation And Maintenance) mechanisms that
facilitate implementation of efficient restoration techniques. The unique characteristics
of tactical networks and their impact on restoration are also presented.
A significant part of the research was the study and evaluation of existing approaches to
failure restoration in civil networks. A critical analysis of the suitability of these
approaches to the tactical environment shows no one restoration algorithm fully meets
the requirements of tactical networks. Consequently, two restoration algorithms for
tactical A TM networks, DRA-TN (Dynamic Restoration Algorithm for Tactical
Networks) and PPR-TN (Pre-planned Restoration Algorithm for Tactical Networks), are
proposed and described in detail. Since the primary concern of restoration in tactical
networks is the recovery of high priority connections the proposed algorithms attempt to
restore high-priority connections by disrupting low-priority calls. Also, a number of
additional mechanisms are proposed to reduce the use of bandwidth, which is a scarce
resource in tactical networks.
It is next argued that software simulation is the most appropriate method to prove the
consistency of the proposed algorithms, assess their performance and test them on
different network topologies as well as traffic and failure conditions.
For this reason a simulation software package was designed and built specifically to
model the proposed restoration algorithms. The design of the package is presented in
detail and the most important implementation issues are discussed. The proposed
restoration algorithms are modelled on three network topologies under various traffic
loads, and their performance compared against the performance of known algorithms
proposed for civil networks. It is shown that DRA-TN and PPR-TN provide better
restoration of higher priority traffic. Furthermore, as the traffic load increases the
relative performance of the DRA-TN and PPR-TN algorithms increases. The DRA-TN
and PPR-TN algorithms are also compared and their advantages and disadvantages
noted.
Also, recommendations are given about the applicability of the proposed algorithms,
and some practical implementation issues are discussed. The number of problems that
need further study are briefly described.Defence Engineering Research Agency of Great Britai
- âŚ