5 research outputs found

    An analytical model for jitter in IP networks

    Get PDF
    ABSTRACT: Traditionally, IP network planning and design is mostly based on the average delay or loss constraints which can often be easily calculated. Jitter, on the other hand, is much more difficult to evaluate, but it is particularly important to manage the QoS of real-time and interactive services such as VoIP and streaming video. In this paper, we present simple formulas for the jitter of Poisson traffic in a single queue that can be quickly calculated . It takes into account the packets delay correlation and also the correlation of tandem queues that have a significant impact on the end-to-end jitter. We then extend them to the end-to-end jitter of a tagged stream based on a tandem queueing network. The results given by the model are then compared with event-driven simulations. We find that they are very accurate for Poisson traffic over a wide range of traffic loads and more importantly that they yield conservative values for the jitter so that they can be used in network design procedures. We also find some very counter-intuitive results. We show that jitter actually decreases with increasing load and the total jitter on a path depends on the position of congested links on that path. We finally point out some consequences of these results for network design procedures

    Investigation of delay jitter of heterogeneous traffic in broadband networks

    Get PDF
    Scope and Methodology of Study: A critical challenge for both wired and wireless networking vendors and carrier companies is to be able to accurately estimate the quality of service (QoS) that will be provided based on the network architecture, router/switch topology, and protocol applied. As a result, this thesis focuses on the theoretical analysis of QoS parameters in term of inter-arrival jitter in differentiated services networks by deploying analytic/mathematical modeling technique and queueing theory, where the analytic model is expressed in terms of a set of equations that can be solved to yield the desired delay jitter parameter. In wireless networks with homogeneous traffic, the effects on the delay jitter in reference to the priority control scheme of the ARQ traffic for the two cases of: 1) the ARQ traffic has a priority over the original transmission traffic; and 2) the ARQ traffic has no priority over the original transmission traffic are evaluated. In wired broadband networks with heterogeneous traffic, the jitter analysis is conducted and the algorithm to control its effect is also developed.Findings and Conclusions: First, the results show that high priority packets always maintain the minimum inter-arrival jitter, which will not be affected even in heavy load situation. Second, the Gaussian traffic modeling is applied using the MVA approach to conduct the queue length analysis, and then the jitter analysis in heterogeneous broadband networks is investigated. While for wireless networks with homogeneous traffic, binomial distribution is used to conduct the queue length analysis, which is sufficient and relatively easy compared to heterogeneous traffic. Third, develop a service discipline called the tagged stream adaptive distortion-reducing peak output-rate enforcing to control and avoid the delay jitter increases without bound in heterogeneous broadband networks. Finally, through the analysis provided, the differential services, was proved not only viable, but also effective to control delay jitter. The analytic models that serve as guidelines to assist network system designers in controlling the QoS requested by customer in term of delay jitter

    Time keeping in myriad networks : theories, solutions and applications

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2001.Includes bibliographical references (leaves 70-72).Distributed sensor networks make extensive use of a common time reference. In this work we address the problem of time dissemination in a packet switched network when the nodes are NOT generally all connected to an accurate, external time reference source. We thoroughly analyze Network Time Protocol - version 3 and identify its oversimplified clock modeling and its neglect of network delay variance (network jitter) as the primal causes for its inaccuracy. We explicitly address frequency skew in our clock model and propose a novel Kalman filtering technique for de-noising (remove of network jitter) during the NTP time synchronization process. The parameters of the Kalman linear estimator are optimal and they are computed online from the network environment, with a well-defined procedure. Our End-to-End technique decreases NTP rms error by two orders of magnitude and is compared with a software phased lock loop and a linear programming technique, with cross traffic exhibiting long-range dependence (fractional Brownian motion cross-traffic) or no dependence at all (white Gaussian case). We conclude with applications over packet switched networks that require time synchronization, like spatial filtering (beam-forming). The suite of algorithms and applications define a new class of packet switched networks, called Myriad Networks.by Aggelos Anastasiou Bletsas.S.M

    Study of Delay Jitter with and without Peak Rate Enforcement

    No full text
    In this work the modification of a tagged traffic stream due to statistical multiplexing is studied, by presenting a numerical approach for the calculation of the tagged delay jitter and interdeparture processes. Both the single and multiple node cases are considered

    Study of Delay Jitter With and Without Peak Rate Enforcement

    No full text
    Abstract — In this paper, the modification of a tagged traffic stream due to statistical multiplexing is studied by presenting a numerical approach for the calculation of the tagged delay jitter and interdeparture processes. Both the single- and multiplenode cases are considered. Unlike the past work, the developed approach is applicable under both the standard FCFS policy and a peak-rate enforcing multiplexing policy. The latter policy can be adopted to reshape the tagged traffic stream within the network. Restoring a shaped traffic profile within the network may be necessary to obtain some of the benefits for which the original shaping is carried out at the network edge. This study also provides results and insight regarding the potential gains of reregulation within the network. I
    corecore