8,002 research outputs found

    Multiplexing regulated traffic streams: design and performance

    Get PDF
    The main network solutions for supporting QoS rely on traf- fic policing (conditioning, shaping). In particular, for IP networks the IETF has developed Intserv (individual flows regulated) and Diffserv (only ag- gregates regulated). The regulator proposed could be based on the (dual) leaky-bucket mechanism. This explains the interest in network element per- formance (loss, delay) for leaky-bucket regulated traffic. This paper describes a novel approach to the above problem. Explicitly using the correlation structure of the sources’ traffic, we derive approxi- mations for both small and large buffers. Importantly, for small (large) buffers the short-term (long-term) correlations are dominant. The large buffer result decomposes the traffic stream in a stream of constant rate and a periodic impulse stream, allowing direct application of the Brownian bridge approximation. Combining the small and large buffer results by a concave majorization, we propose a simple, fast and accurate technique to statistically multiplex homogeneous regulated sources. To address heterogeneous inputs, we present similarly efficient tech- niques to evaluate the performance of multiple classes of traffic, each with distinct characteristics and QoS requirements. These techniques, applica- ble under more general conditions, are based on optimal resource (band- width and buffer) partitioning. They can also be directly applied to set GPS (Generalized Processor Sharing) weights and buffer thresholds in a shared resource system

    Economic FAQs About the Internet

    Get PDF
    This is a set of Frequently Asked Questions (and answers) about the economic, institutional, and technological structure of the Internet. We describe the history and current state of the Internet, discuss some of the pressing economic and regulatory problems, and speculate about future developments.Internet, telecommunications, congestion pricing, National Information Infrastructure

    Time Driven Priority Router Implementation and First Experiments

    Get PDF
    This paper reports on the implementation of Time-Driven Priority (TDP) scheduling on a FreeBSD platform. This work is part of a TDP prototyping and demonstration project aimed at showing the implications of TDP deployment in packet-switched networks, especially benefits for real-time applications. This paper focuses on practical aspects related to the implementation of the technology on a Personal Computer (PC)-based router and presents the experimental results obtained on a testbed network. The basic building blocks of a TDP router are described and implementation choices are discussed. The relevant results achieved and here presented can be categorized into two types: qualitative results, including the successful integration of all needed blocks and the insight obtained on the complexity related to the implementation of a TDP router, and quantitative ones, including measures of achievable network utilization and of jitter experienced on a fully-loaded TDP network. The outcome demonstrates the effectiveness of the presented implementation while confirming TDP points of strengt

    Operational and Performance Issues of a CBQ router

    Get PDF
    The use of scheduling mechanisms like Class Based Queueing (CBQ) is expected to play a key role in next generation multiservice IP networks. In this paper we attempt an experimental evaluation of ALTQ/CBQ demonstrating its sensitivity to a wide range of parameters and link layer driver design issues. We pay attention to several CBQ internal parameters that affect performance drastically and particularly to “borrowing”, a key feature for flexible and efficient link sharing. We are also investigating cases where the link sharing rules are violated, explaining and correcting these effects wheneverpossible. Finally we evaluateCBQ performance and make suggestions for effective deployment in real networks.

    A new approach to service provisioning in ATM networks

    Get PDF
    The authors formulate and solve a problem of allocating resources among competing services differentiated by user traffic characteristics and maximum end-to-end delay. The solution leads to an alternative approach to service provisioning in an ATM network, in which the network offers directly for rent its bandwidth and buffers and users purchase freely resources to meet their desired quality. Users make their decisions based on their own traffic parameters and delay requirements and the network sets prices for those resources. The procedure is iterative in that the network periodically adjusts prices based on monitored user demand, and is decentralized in that only local information is needed for individual users to determine resource requests. The authors derive the network's adjustment scheme and the users' decision rule and establish their optimality. Since the approach does not require the network to know user traffic and delay parameters, it does not require traffic policing on the part of the network

    Developments, Issues, and Initiatives in Retail Payments

    Get PDF
    Innovations in basic information technologies, in payment applications, and in the availability of global markets, as well as substantial changes in financial sector policy, have fundamentally changed how the retail payments system in Canada operates. Principally, the volume and types of electronic payments have grown, and there is increased participation by diverse groups of financial and non-financial institutions as providers of retail payment services. The resulting policy problem for payment systems is how best to benefit from efficiency gains while managing payment risks. O'Connor examines the effect of the technological and legislative changes and the initiatives developed by the public and private sectors in such areas as the market arrangements for services; customer risks and costs for settling large-value retail payments; the security of payment information and the efficiency with which it is transmitted; and the effects of differing regulatory regimes on competition among providers of retail payment services.

    CSMA/RN: A universal protocol for gigabit networks

    Get PDF
    Networks must provide intelligent access for nodes to share the communications resources. In the range of 100 Mbps to 1 Gbps, the demand access class of protocols were studied extensively. Many use some form of slot or reservation system and many the concept of attempt and defer to determine the presence or absence of incoming information. The random access class of protocols like shared channel systems (Ethernet), also use the concept of attempt and defer in the form of carrier sensing to alleviate the damaging effects of collisions. In CSMA/CD, the sensing of interference is on a global basis. All systems discussed above have one aspect in common, they examine activity on the network either locally or globally and react in an attempt and whatever mechanism. Of the attempt + mechanisms discussed, one is obviously missing; that is attempt and truncate. Attempt and truncate was studied in a ring configuration called the Carrier Sensed Multiple Access Ring Network (CSMA/RN). The system features of CSMA/RN are described including a discussion of the node operations for inserting and removing messages and for handling integrated traffic. The performance and operational features based on analytical and simulation studies which indicate that CSMA/RN is a useful and adaptable protocol over a wide range of network conditions are discussed. Finally, the research and development activities necessary to demonstrate and realize the potential of CSMA/RN as a universal, gigabit network protocol is outlined

    Congenital microcephaly

    Get PDF
    The underlying etiologies of genetic congenital microcephaly are complex and multifactorial. Recently, with the exponential growth in the identification and characterization of novel genetic causes of congenital microcephaly, there has been a consolidation and emergence of certain themes concerning underlying pathomechanisms. These include abnormal mitotic microtubule spindle structure, numerical and structural abnormalities of the centrosome, altered cilia function, impaired DNA repair, DNA Damage Response signaling and DNA replication, along with attenuated cell cycle checkpoint proficiency. Many of these processes are highly interconnected. Interestingly, a defect in a gene whose encoded protein has a canonical function in one of these processes can often have multiple impacts at the cellular level involving several of these pathways. Here, we overview the key pathomechanistic themes underlying profound congenital microcephaly, and emphasize their interconnected nature

    Slipping Behind: Low-Income Los Angeles Households Drift Further From the Financial Mainstream

    Get PDF
    Surveys trends among low-income households without bank accounts, barriers to opening or maintaining accounts, continued use of alternative financial services, and impact of the city's Bank on LA program to promote banking. Makes policy recommendations

    Capacity Requirements of Traffic Handling Schemes in Multi-Service Networks

    Get PDF
    Cataloged from PDF version of article.This paper deals with the impact of traffic handling mechanisms on capacity for different network architectures. Three traffic handling models are considered: per-flow, class-based and best-effort (BE). These models can be used to meet service guarantees, the major differences being in their complexity of implementations and in the quantity of network resources that must be provided. In this study, the performance is fixed and the required capacity determined for various combinations of traffic handling architectures for edge-core networks. This study provides a comparison of different QoS architectures. One key result of this work is that on the basis of capacity requirements, there is no significant difference between semi-aggregate traffic handling and per-flow traffic handling. However, best-effort handling requires significantly more capacity as compared to the other methods. (C) 2004 Elsevier B.V. All rights reserve
    • 

    corecore