SlideShare a Scribd company logo
1 of 7
Communications and Network, 2011, 3, 161-167
doi:10.4236/cn.2011.33020 Published Online August 2011 (http://www.SciRP.org/journal/cn)



                   Usage of Erlang Formula in IP Networks
                           Erik Chromy, Jan Suran, Matus Kovacik, Matej Kavacky
 Institute of Telecommunications, Faculty of Electrical Engineering and Information Technology, Slovak University of
                                      Technology, Bratislava, Slovak Republic
                     E-mail: {chromy, kovaci, kavacky}@ut.fei.stuba.sk, suran.jan@pivopraha.cz
                        Received May 29, 2011; revised July 5, 2011; accepted July 12, 2011

Abstract

This paper is concerning of Erlang formulas practical approval and their usage with video flow transfer in IP
networks. Erlang formulas were simulated in MATLAB program. Practical verification was realized in de-
fined environment by using of designed video source. The result is comparison of loss calculated by MAT-
LAB and loss of real video data transfer.

Keywords: Erlang Formula, QoS, VBR Video

1. Introduction                                                  works that have bandwidth, delay and availability guar-
                                                                 anteed.
IP networks were not designed for providing multimedia             Most important parameters are:
services at the beginning. These networks were intended           Availability - service reliability during whole connec-
for data transfer without predefined paths so that in case          tion time.
of breakdown of one of the routers, other path could be           Delay - packet transfer time between two reference
chosen [1]. Path of packet can change and so can change             points.
transfer parameters.                                              Jitter - represents changes in delay.
   If we want to use IP networks for voice, video and             Throughput - data transferred per time unit.
multimedia transmission, we have to define transfer pa-           Packet loss - allowed packet loss tolerance per time
rameters. These parameters are covered under QoS (Qual-             unit.
ity of Service). For observance of QoS [2-5] parameters it         QoS assurance in IP network is done through SLA
is necessary to estimate network performance under load          (Service Level Agreement). It is a contract between end
and link overflow.                                               user and network provider. SLA includes assurance of
   This problem is handled by theory of queuing systems.         many parameters, for example:
Therefore we will use Erlang B and Erlang C formulas.             Availability.
Erlang B formula deals with data loss in relation with            Class of service providing.
network load. Erlang C formula defines probability of             QoS guarantee.
inserting data into waiting queues and so resembles to IP
network behavior, where data queuing occurs before               1.2. VBR Video
sending further.
                                                                 Because video is basically only a slideshow of pictures
1.1. QoS in IP Networks                                          displayed at sufficient frequency, it is necessary to com-
                                                                 press video flow. Common video flow has a frame rate
Increasing number of user requests for application and           of 23-30 frames per second [6]. Different lossmaking and
multimedia services was an impulse for development of            also lossless methods are used for each frame. However,
protocols that can assure QoS within IP network. This            compression of individual frames is not a final solution.
way of requirements has risen not only for network func-         CBR (Constant Bit Rate) is a method of saving frames
tionality, but also for transfer parameters observance. If       only in compressed form. This data flow does not change
these QoS parameter requirements are observed, IP net-           its bandwidth requirements, because same type of com-
work can even out ISDN (Integrated Services Digital              pression is applied to every frame. With this type of
Network) or ATM (Asynchronous Transfer Mode) net-                video flow we always have complete picture available


Copyright © 2011 SciRes.                                                                                               CN
162                                                 E. CHROMY ET AL.

and there is no need to use methods for combining more        feature. Labeled packets of video flow then will be con-
pictures together.                                            centrated into one link or divided. We will install a cus-
   VBR (Variable Bit Rate) – this special data flow uses      tom package for traffic engineering, where classes,
several type of frames. Position of frame in the video        queues and filters can be created. These three main ele-
plays important role and it uses differences between pic-     ments are defining routing mechanisms in router. This
tures. This video flow does not produce data flow of          type of server with OS linux installed can be a low price
constant bandwidth (it changes in relation to frame dif-      alternative to routers used in commercial networks.
ferences). This flow can consist of these types of frames:
 Information frame (key frame) – CBR consists only           2.1. IP Tables
    from these frames.
 Prediction frame.                                           IP tables is a mechanism implemented directly into core
 Differential frame.                                         of Linux operating system and serves for setting of IP
                                                              traffic rules. It can change headers or drop packets. In
1.3. Waiting Queue Systems                                    our case, it will be used only for packet labeling. Labeled
                                                              packets can be separated into individual data flows and
WQS (waiting queue systems) are systems with input            then formed by traffic engineering package. IP tables
requirements, service times, queues and other system          consist of three parts: incoming, outgoing and forward-
properties [7-9]. Basic properties of WQS are defined as      ing. We can insert rules into these groups. If packets
follows:                                                      passes first rule, other rules in chain are not tested and
          WQS   A, B, X , Y , Z , V        (1)             packet is processed with the first rule definitions. For
                                                              example, it can be labeled or dropped.
where these symbols mean following:
 A – arrival process:                                        2.2. Classes
   ♦ M – poisson distribution,
   ♦ Ek – Erlang distribution,                                or keeping our defined bandwidths. If we want to reduce
   ♦ D – deterministic distribution,                          speed to 2Mbit/s, we can create a class that ensure, that
   ♦ G – any empirical distribution.                          overflowed data will go to a queue and then will be sent.
 B –service time distribution.                               Linux uses two common classes:
 X – number of parallel service channels.                     CBQ (Classfull Based Queuing).
 Y – maximum number of requests in source,                    HTB (Hierarchy Token Bucket) [14].
 Z – maximum queue length.
 V – type of queuing.                                        2.3. Queues
   WQS are also divided into types with and without
feedback. Systems with feedback are called closed sys-        Queues in traffic engineering influence which data will
tems, when request is returned back. If only part of the      be send and which will have to wait in queue. There exist
service requests is returned back, these systems are hy-      many mechanisms for queue managing and they are as-
brid systems. These hybrid types are mostly used in           signed to CBQ or HTB. Queues are class independent.
praxis.                                                       Basic configuration of Traffic control package includes
                                                              following types of queues:
2. Simulation Environment                                      FIFO (First in First Out).
                                                               PFIFO (Priority FIFO).
Linux is an open-source operating system (OS). It has          SFQ (Stochastic Fairness Queuing).
gained a lot of fans mostly because of its low system          RED (Random Early Detection).
requirements, wide modularity and openness. In this
system every part of the core is documented and avail-        2.4. Filters
able [10-13]. Thanks to this attribute, OS Linux or its
core is implemented in many devices (routers). In our         Last and very important parts of our flow regulation
case we used linux distribution Debian 4.0, installed it on   package are filters. Filter serves for inserting data into
a PC that serves as a router, web server, file server and     the right class. In our case, filter chooses class by lables
other applications server. There will also be installed a     that were added by IP tables. But also these filters can
simulation program for traffic simulation, that will send     analyze packet headers and assign data to right classes.
video flows of defined parameters. Linux is capable of        These filters are paired with main classes and classes
packet modification from its core and we will use this        then insert data correctly based on corresponding filters.


Copyright © 2011 SciRes.                                                                                              CN
E. CHROMY ET AL.                                                         163

2.5. Designed Model Environment

Our designed model of simulation environment is shown
in Figure 1. We used one client for creation of video
traffic and two clients for receiving and video data proc-
essing. Whole communication ran through server, which
stood as a router and traffic shaper. This network was
built and configured based on knowledge from literature
[14-18]. All network elements were capable of 1GBit/s
(if we did not use server for link limitation, we would not
be able to correctly measure IP network behavior under
load).

2.6. VBR Video Model

For real traffic simulation in IP network, simple model
with JPG frame compression is sufficient for our pur-
poses. As video source was used a webcam. It captured
one minute long recording, all measurements used same
data and so results were comparable. Our model is
shown in Figure 2 and was designed based on informa-                  Figure 2. Video model with VBR data flow.
tion from [19-21].
                                                              der link load [22]. Its basic form is (2):
3. Erlang Formulas in MATLAB                                                                    C
                                                                                       e  *
In 1917 Agner Kralup Erlang published Solution of some             B  E1,C              C !   * E1,C 1          (2)
                                                                                      C
                                                                                                x C   * E1,C 1   
Probléme in the Theory of Probabilities of Significance                                e  * x !
in Automatic Telephone Exchanges. In this publication                                 x 0

he stated his formulas for loss and waiting time in te-          Symbol meanings are:
lephony traffic.                                                - total load [%],
                                                               C - number of links.
3.1. Erlang B Formula                                            We revised formula (2) into form (3), which is more
                                                              appropriate for calculations. From this formula results
Erlang B formula deals with probability of data loss un-      relation of two parameters:
                                                                - link load in [%],
                                                               C - link speed in Mbit/s.
                                                                                                       C
                                                                                          E1  CC ! k                      (3)
                                                                                                            
                                                                                                      k!
                                                                                                     k 0




                                                              Figure 3. Data loss probability in the case of constant
                 Figure 1. Tested model.                      bandwidth.


Copyright © 2011 SciRes.                                                                                                   CN
164                                                       E. CHROMY ET AL.

  From Figure 3. results:
 Probability of loss increases with link load.
 With increasing bandwidth data loss is decreasing.
  After revision and modification of Erlang formula
with parameter m, (number of sources in common path)
we used formula (4) for further calculations. Other pa-
rameters stayed the same.

                                        m. 
                                                  c



              E1   , c, m           c!                    (4)   Figure 5. Probability of insertion into waiting queue in case
                                    c  m. 
                                              i
                                                                    of constant bandwidth.
                                   i 0 i !
                                                                     With low link speeds (under 16 Mbit/s), the behav-
   Common path means that more flows are transferred
                                                                       iour of probabilities is nearly linear.
through one way. Link bandwidth requirements are then
                                                                      Formula (6) extended by m parameter:
summarized together.
   From Figure 4. results:                                                E2,C  m *  
 Under low link load with increasing number of
                                                                                          m *  
                                                                                                         Ccp
                                                                                                                       Ccp
    sources is data loss probability reduced.                                                                  *
 Under higher link load (5%) this difference is not as                                        Ccp !               Ccp   m *                  (7)
                                                                          
                                                                                       m*             m *  
                                                                              Ccp 1             x                    Ccp
    much notable and the loss is gradually flatten.                                                                                 Ccp
                                                                                         x!
                                                                                                     
                                                                                                               Ccp !
                                                                                                                            *
                                                                                                                                Ccp   m *  
                                                                               x 0
3.2. Erlang C Formula
                                                                    Where:
Probability of waiting the requests in queue is described             - link load [%].
by second Erlang formula (5).                                        Ccp – link speed (for common path) in Mbit/s.
                                                                     m – number of sources.
                                  C  C                               From Figure 6. results:
                                    *
                                  C! C                             With increasing link load and constant bandwidth, the
            E2,C     C 1                                 (5)
                                x       C  C                         probability of insertion into waiting queue increases.
                               x!
                                             *
                                         C! C                      With higher common path utilization, the probability
                         x 0
                                                                       of insertion into waiting queue is also higher.
  For calculations, a form without factorials is prefer-             With increasing of common path bandwidth, it is
able. In case that   C , we can rewrite formula to (6).              possible multiple use of traffic links also with higher
                                         C                             load.
              E2,C  E1,C *                                   (6)    Common path bandwidth affects slope of probability
                                C   1  E1,C    
                                                     
                                                                       of insertion into waiting queue.
  From Figure 5. results:
 With increasing link load, probability of insertion into          4. Results Comparison
   waiting queue also increases.
 With increasing bandwidth, probability of insertion               When comparing results from MATLAB simulations and
   into waiting queue decreases.                                    real measurements, it is necessary to consider VBR video
                                                                    characteristics and used queues for traffic shaping. For




Figure 4. Data loss probability in the case of constant             Figure 6. Probability of insertion into waiting queue in case
bandwidth 2 Mbit/s and m flows.                                     of common usage of 4 Mbit/s link.


Copyright © 2011 SciRes.                                                                                                                          CN
E. CHROMY ET AL.                                                   165

simulation of formula B we used RED mechanism, be-
cause packets were dropped after reaching maximum
queue length. Formula C uses SFQ mechanism, which does
not drop packets, but inserts them into waiting queue.

4.1. Erlang B Formula

Firstly we measured loss in relation to link load at 2
Mbit/s, 4 Mbit/s and 8 Mbit/s link capacity. In Figure 7.
we can see that graphs look like in simulations (section
3.1), but values of loss are much lower (loss decreases       Figure 9. Loss probability in case of 4 Mbit/s bandwidth
with link capacity). This is caused by VBR video char-        and m flows.
acteristics, where loss does not occurs until reaching link
capacity.
   Next testing of formula B was by common usage of
the link (Figures 8, 9 and 10). Each flow was transferred
with some time delay against other flows. This way we
prevented overloading of the link by VBR video. From
this measurement results:
 With constant network load and increasing bandwidth
    it is possible to raise the number of sources.
 With constant load and bandwidth, loss increases
    with number of sources per link.                          Figure 10. Loss probability in case of 8 Mbit/s bandwidth
 With increasing link capacity we can add number of          and m flows.
    sources per one path.
                                                              cept for the fact, that data which came later, were labeled
4.2. Erlang C Formula                                         as loss, because they went to waiting queue.
                                                                 From Figure 11. results:
The method was the same as with Erlang B formula, ex-          SFQ waiting queue is a better choice for VBR video,
                                                                  because of its better handle with high-peak rate .
                                                               Compared to MATLAB simulations, loss is under 5%
                                                                  even until full network usage. This is caused by SFQ
                                                                  queue and VBR data model.
                                                                 We also tried common path usage with Erlang C for-
                                                              mula (Figures12, 13 and 14.). Flows were put together
                                                              in the same way as with Erlang B formula. Simulation
                                                              results:
                                                               Graphs are now comparable with MATLAB simula-
                                                                  tions (the curves look similar), but with lower prob-
                                                                  ability of loss.
 Figure 7. Loss probability in case of constant bandwidth.




Figure 8. Loss probability in case of 2 Mbit/s bandwidth
and m flows.                                                  Figure 11. Loss probability in case of constant bandwidth.


Copyright © 2011 SciRes.                                                                                             CN
166                                             E. CHROMY ET AL.

                                                            video data flow. We have showed the difference between
                                                            two link shaping methods and we found out that SFQ is
                                                            more appropriate for usage. Erlang formula is then a
                                                            good choice for VBR data flow calculations with respect
                                                            to loss dependencies. It is possible to estimate network
                                                            behavior under load with these formulas. These formulas
                                                            give us only approximately estimation. Loss probabilities
                                                            were not exactly as predicted by calculations, but lower.
                                                            It is caused by VBR video characteristics and data trans-
                                                            fer method in IP networks. Calculations and real meas-
                                                            urements have shown advantages of effective link load.
                                                            Putting more VBR flows together into one link has
Figure 12. Loss probability in case of m flows and 2 Mbit
                                                            greatly improved effectiveness of data transfer.
bandwidth.

                                                            6. Acknowledgements

                                                            This work is a part of research activities conducted at
                                                            Slovak University of Technology Bratislava, Faculty of
                                                            Electrical Engineering and Information Technology,
                                                            Department of Telecommunications, within the scope of
                                                            the projects VEGA No. 1/0565/09, Modelling of traffic
                                                            parameters in NGN telecommunication networks and
                                                            services and ITMS 26240120029 “Support for Building
                                                            of Centre of Excellence for SMART technologies, sys-
                                                            tems and services II”.

Figure 13. Loss probability in case of m flows and 4 Mbit   7. References
bandwidth.
                                                            [1]   L. Dostálek and A. Kabelová, “Understanding TCP/IP,”
                                                                  Packt, Birmingham, 2006.
                                                            [2]   A. Kováč, M. Halás and M. Vozňák, “Impact of Jitter on
                                                                  Speech Guality Estimation in Modified E-Model,” 12th
                                                                  International Conference Research in Telecommunica-
                                                                  tion Technology, Velké Losiny, 8-10 September 2010, p.
                                                                  225.
                                                            [3]   T. Mišuth and I. Baroňák, “Performance Forecast of
                                                                  Contact Centre with Differently Experienced Agents,”
                                                                  Elektrorevue, Vol. 15, No. 97, 2010.
                                                            [4]   I. Baroňák and J. Mičuch, “Preventive Methods Support-
                                                                  ing QOS in IP,” New Information and Multimedia Tech-
                                                                  nologies. NIMT – 2009, Brno University of Technology,
                                                                  Brno, 17-18 September 2009, pp. 15-23.
Figure 14. Loss probability in case of m flows and 8 Mbit
bandwidth.                                                  [5]   T. Balogh, D. Luknárová and M. Medvecký, “Perform-
                                                                  ance of Round Robin-Based Queue Scheduling Algo-
                                                                  rithms,” The Third International Conference on Commu-
 Similar to Erlang B formula, it is useful to put to-
                                                                  nication Theory, Reliability and Quality of Service, Ath-
  gether more flows into one path.                                ens, 13-19 June 2010, pp. 156-161.
 With increasing bandwidth, we can put together more
                                                            [6]   C. Wootton, “A Practial Guide to Video and Audio
  flows into one path and assure acceptable loss (based           Compression,” Focal Press, Oxford, 2005.
  on SLA).
                                                            [7]   Š. Peško, “System Queuing Theory,” 2001.
                                                                  http://frcatel.fri.uniza.sk/users/pesko/OA2/oa2m.pdf
5. Conclusions                                              [8]   J. F. Hayes, et al., “Modeling and Analysis of Telecom-
                                                                  munications Networks,” Wiley Interscience, New York,
The purpose of this work was to evaluate utilization of           2004.
Erlang B and C formulas in IP environment with VBR          [9]   V. B. Iversen, “Teletraffic Engineering Handbook,”


Copyright © 2011 SciRes.                                                                                               CN
E. CHROMY ET AL.                                                   167

     COM Centre, Technical University of Denmark, Copen-      [16] G. Davies, “Designing and Developing Scalable IP Net-
     hagen, 2001.                                                  work,” John Wiley & Sons Ltd, Hoboken, 2004.
[10] T. Graf, G. Maxwell and R. Mook, “Linux Advanced         [17] G. Held, “Ethernet Networks–Fourth Edition,” John
     Routing & Traffic Control,” 2004.                             Wiley & Sons Ltd, Hoboken, 2003.
     http://lartc.org/.                                       [18] S. Plumley, “Home Networking Bible,” John Wiley &
[11] K. Thomas, “Beginning Ubuntu Linux from Novice to             Sons Ltd, Hoboken, 2004.
     Professional,” Apress, New York City, 2006.              [19] V. Pirogov, “Mastership in Assembler Language,” Com-
[12] M. Bauer, “Building Secure Servers with LINUX,”               puter Press, Brno, 2005.
     O’Reilly Media, Sebastopol, 2003.                        [20] J. Pirkl, “Network programming in Windows and internet
[13] S. Hunger, “Debian GNU-Linux Bible,” Hungary Minds,           programming,” Kopp, České Budějovice, 2001.
     New York, 2001.                                          [21] R. Chalupa, “1001 tips and tricks for Visual C++,”
[14] A. Kist, “Erlang B as a Performance Model for IP Flows        Computer Press, Brno, 2003, ISBN 1-904811-71-0.
     Networks,” 15th IEEE International Conference on Net-    [22] I. Baroňák, “Lecture on Switching Systems II,” 08/09,
     works, Adelaide, 19-21 November 2007, pp. 37-41.              FEI STU Bratislava.
[15] M. Hofmann and L. Beaumont, “Content Networking,”             http://www.ktl.elf.stuba.sk/~baronak/PEDAGOGIKA.ht
     MK Publishers, St Petersburg, 2005, pp. 834-836.              m




Copyright © 2011 SciRes.                                                                                             CN

More Related Content

What's hot

Qualcomm lte-mobility-enhancements
Qualcomm lte-mobility-enhancementsQualcomm lte-mobility-enhancements
Qualcomm lte-mobility-enhancementsAloke Chakraborty
 
Frame relay
Frame relay Frame relay
Frame relay balub4
 
Lab 10 manual(1)
Lab 10 manual(1)Lab 10 manual(1)
Lab 10 manual(1)trayyoo
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)IAESIJEECS
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015vtunotesbysree
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networkingsdb2002
 

What's hot (20)

Qualcomm lte-mobility-enhancements
Qualcomm lte-mobility-enhancementsQualcomm lte-mobility-enhancements
Qualcomm lte-mobility-enhancements
 
Chp4
Chp4Chp4
Chp4
 
Frame relay
Frame relay Frame relay
Frame relay
 
Lecture04 H
Lecture04 HLecture04 H
Lecture04 H
 
Chapter4[one.]
Chapter4[one.]Chapter4[one.]
Chapter4[one.]
 
V25112115
V25112115V25112115
V25112115
 
Lab 10 manual(1)
Lab 10 manual(1)Lab 10 manual(1)
Lab 10 manual(1)
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Chapter7 l1
Chapter7 l1Chapter7 l1
Chapter7 l1
 
D3.2b_v1.0_final
D3.2b_v1.0_finalD3.2b_v1.0_final
D3.2b_v1.0_final
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)16 6 feb17 13473 27587-1-rvfinal(edit)
16 6 feb17 13473 27587-1-rvfinal(edit)
 
QSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network ConceptsQSpiders - Good to Know Network Concepts
QSpiders - Good to Know Network Concepts
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 
QOS of MPLS
QOS of MPLSQOS of MPLS
QOS of MPLS
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networking
 

Similar to Networks

NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
 
Dynamic classification in silicon-based forwarding engine environments
Dynamic classification in silicon-based forwarding engine environmentsDynamic classification in silicon-based forwarding engine environments
Dynamic classification in silicon-based forwarding engine environmentsTal Lavian Ph.D.
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)IISRT
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS ijwmn
 
2002023
20020232002023
2002023pglehn
 
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSA STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSijscmcj
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos TechniquesKatie Gulley
 
A-Serv: A Novel Architecture Providing Scalable Quality of Service
A-Serv: A Novel Architecture Providing Scalable Quality of ServiceA-Serv: A Novel Architecture Providing Scalable Quality of Service
A-Serv: A Novel Architecture Providing Scalable Quality of ServiceCSCJournals
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
QoS (quality of service)
QoS (quality of service)QoS (quality of service)
QoS (quality of service)Sri Safrina
 
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
 
Proposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidthProposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidthijcsity
 
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTEImplementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTEIJERA Editor
 

Similar to Networks (20)

NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
 
ADAPTIVE
ADAPTIVEADAPTIVE
ADAPTIVE
 
Dynamic classification in silicon-based forwarding engine environments
Dynamic classification in silicon-based forwarding engine environmentsDynamic classification in silicon-based forwarding engine environments
Dynamic classification in silicon-based forwarding engine environments
 
Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)Iisrt arunkumar b (networks)
Iisrt arunkumar b (networks)
 
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS ON THE SUPPORT OF MULTIMEDIA APPLICATIONS  OVER WIRELESS MESH NETWORKS
ON THE SUPPORT OF MULTIMEDIA APPLICATIONS OVER WIRELESS MESH NETWORKS
 
40520130101004
4052013010100440520130101004
40520130101004
 
2002023
20020232002023
2002023
 
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGSA STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
A STUDY OF QOS 6LOWPAN FOR THE INTERNET OF THINGS
 
An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
 
IFD30104 Chapter 1
IFD30104 Chapter 1IFD30104 Chapter 1
IFD30104 Chapter 1
 
A-Serv: A Novel Architecture Providing Scalable Quality of Service
A-Serv: A Novel Architecture Providing Scalable Quality of ServiceA-Serv: A Novel Architecture Providing Scalable Quality of Service
A-Serv: A Novel Architecture Providing Scalable Quality of Service
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
How to implement mpls
How to implement mplsHow to implement mpls
How to implement mpls
 
QoS (quality of service)
QoS (quality of service)QoS (quality of service)
QoS (quality of service)
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
Hp3613441350
Hp3613441350Hp3613441350
Hp3613441350
 
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSRESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKS
 
Proposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidthProposed wfq based dynamic bandwidth
Proposed wfq based dynamic bandwidth
 
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTEImplementing a Session Aware Policy Based Mechanism for QoS Control in LTE
Implementing a Session Aware Policy Based Mechanism for QoS Control in LTE
 
Frame
FrameFrame
Frame
 

More from Alvaro Gomes

Museu nacional de história natural e da ciência
Museu nacional de história natural e da ciênciaMuseu nacional de história natural e da ciência
Museu nacional de história natural e da ciênciaAlvaro Gomes
 
Luís Vaz de Camões Vida e Obras
Luís Vaz de Camões Vida e Obras Luís Vaz de Camões Vida e Obras
Luís Vaz de Camões Vida e Obras Alvaro Gomes
 
Ética Deontológica Técnico Administrativo
Ética Deontológica Técnico AdministrativoÉtica Deontológica Técnico Administrativo
Ética Deontológica Técnico AdministrativoAlvaro Gomes
 
Revolução Industrial - O Ponto de Viragem
Revolução Industrial - O Ponto de ViragemRevolução Industrial - O Ponto de Viragem
Revolução Industrial - O Ponto de ViragemAlvaro Gomes
 
Linux Commandos Cheat
Linux Commandos CheatLinux Commandos Cheat
Linux Commandos CheatAlvaro Gomes
 
Flash android using livesuit
Flash android using livesuitFlash android using livesuit
Flash android using livesuitAlvaro Gomes
 
13 Things the Government doesn´t want you to know
13 Things the Government doesn´t want you to know13 Things the Government doesn´t want you to know
13 Things the Government doesn´t want you to knowAlvaro Gomes
 
Hackeando facebook com wireshark e cookie injector
Hackeando facebook com wireshark e cookie injectorHackeando facebook com wireshark e cookie injector
Hackeando facebook com wireshark e cookie injectorAlvaro Gomes
 
Como transformar o router thomson num print server
Como transformar o router thomson num print serverComo transformar o router thomson num print server
Como transformar o router thomson num print serverAlvaro Gomes
 
Drivers ADB Android
Drivers ADB AndroidDrivers ADB Android
Drivers ADB AndroidAlvaro Gomes
 
ROM china original (Shenzhen)
ROM china original (Shenzhen)ROM china original (Shenzhen)
ROM china original (Shenzhen)Alvaro Gomes
 
Reinstalar actualizar el sistema operativo android
Reinstalar actualizar el sistema operativo androidReinstalar actualizar el sistema operativo android
Reinstalar actualizar el sistema operativo androidAlvaro Gomes
 
Hackeando facebook com wireshark e cookie injector
Hackeando facebook com wireshark e cookie injectorHackeando facebook com wireshark e cookie injector
Hackeando facebook com wireshark e cookie injectorAlvaro Gomes
 
H4dummies (translated to portuguese)
H4dummies (translated to portuguese)H4dummies (translated to portuguese)
H4dummies (translated to portuguese)Alvaro Gomes
 
Algoritmos e estructura de dados
Algoritmos e estructura de dadosAlgoritmos e estructura de dados
Algoritmos e estructura de dadosAlvaro Gomes
 

More from Alvaro Gomes (20)

Museu nacional de história natural e da ciência
Museu nacional de história natural e da ciênciaMuseu nacional de história natural e da ciência
Museu nacional de história natural e da ciência
 
Luís Vaz de Camões Vida e Obras
Luís Vaz de Camões Vida e Obras Luís Vaz de Camões Vida e Obras
Luís Vaz de Camões Vida e Obras
 
Ética Deontológica Técnico Administrativo
Ética Deontológica Técnico AdministrativoÉtica Deontológica Técnico Administrativo
Ética Deontológica Técnico Administrativo
 
Revolução Industrial - O Ponto de Viragem
Revolução Industrial - O Ponto de ViragemRevolução Industrial - O Ponto de Viragem
Revolução Industrial - O Ponto de Viragem
 
Linux Commandos Cheat
Linux Commandos CheatLinux Commandos Cheat
Linux Commandos Cheat
 
Flash android using livesuit
Flash android using livesuitFlash android using livesuit
Flash android using livesuit
 
Websearch
WebsearchWebsearch
Websearch
 
13 Things the Government doesn´t want you to know
13 Things the Government doesn´t want you to know13 Things the Government doesn´t want you to know
13 Things the Government doesn´t want you to know
 
Hackeando facebook com wireshark e cookie injector
Hackeando facebook com wireshark e cookie injectorHackeando facebook com wireshark e cookie injector
Hackeando facebook com wireshark e cookie injector
 
Como transformar o router thomson num print server
Como transformar o router thomson num print serverComo transformar o router thomson num print server
Como transformar o router thomson num print server
 
Drivers ADB Android
Drivers ADB AndroidDrivers ADB Android
Drivers ADB Android
 
ROM china original (Shenzhen)
ROM china original (Shenzhen)ROM china original (Shenzhen)
ROM china original (Shenzhen)
 
Reinstalar actualizar el sistema operativo android
Reinstalar actualizar el sistema operativo androidReinstalar actualizar el sistema operativo android
Reinstalar actualizar el sistema operativo android
 
Hackeando facebook com wireshark e cookie injector
Hackeando facebook com wireshark e cookie injectorHackeando facebook com wireshark e cookie injector
Hackeando facebook com wireshark e cookie injector
 
H4dummies (translated to portuguese)
H4dummies (translated to portuguese)H4dummies (translated to portuguese)
H4dummies (translated to portuguese)
 
Algoritmos e estructura de dados
Algoritmos e estructura de dadosAlgoritmos e estructura de dados
Algoritmos e estructura de dados
 
HTML - Guia5
HTML - Guia5HTML - Guia5
HTML - Guia5
 
HTML - Guia4
HTML - Guia4HTML - Guia4
HTML - Guia4
 
HTML - Guia 3
HTML - Guia 3HTML - Guia 3
HTML - Guia 3
 
HTML - Guia 1 e 2
HTML - Guia 1 e 2HTML - Guia 1 e 2
HTML - Guia 1 e 2
 

Recently uploaded

定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 

Recently uploaded (20)

定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 

Networks

  • 1. Communications and Network, 2011, 3, 161-167 doi:10.4236/cn.2011.33020 Published Online August 2011 (http://www.SciRP.org/journal/cn) Usage of Erlang Formula in IP Networks Erik Chromy, Jan Suran, Matus Kovacik, Matej Kavacky Institute of Telecommunications, Faculty of Electrical Engineering and Information Technology, Slovak University of Technology, Bratislava, Slovak Republic E-mail: {chromy, kovaci, kavacky}@ut.fei.stuba.sk, suran.jan@pivopraha.cz Received May 29, 2011; revised July 5, 2011; accepted July 12, 2011 Abstract This paper is concerning of Erlang formulas practical approval and their usage with video flow transfer in IP networks. Erlang formulas were simulated in MATLAB program. Practical verification was realized in de- fined environment by using of designed video source. The result is comparison of loss calculated by MAT- LAB and loss of real video data transfer. Keywords: Erlang Formula, QoS, VBR Video 1. Introduction works that have bandwidth, delay and availability guar- anteed. IP networks were not designed for providing multimedia Most important parameters are: services at the beginning. These networks were intended  Availability - service reliability during whole connec- for data transfer without predefined paths so that in case tion time. of breakdown of one of the routers, other path could be  Delay - packet transfer time between two reference chosen [1]. Path of packet can change and so can change points. transfer parameters.  Jitter - represents changes in delay. If we want to use IP networks for voice, video and  Throughput - data transferred per time unit. multimedia transmission, we have to define transfer pa-  Packet loss - allowed packet loss tolerance per time rameters. These parameters are covered under QoS (Qual- unit. ity of Service). For observance of QoS [2-5] parameters it QoS assurance in IP network is done through SLA is necessary to estimate network performance under load (Service Level Agreement). It is a contract between end and link overflow. user and network provider. SLA includes assurance of This problem is handled by theory of queuing systems. many parameters, for example: Therefore we will use Erlang B and Erlang C formulas.  Availability. Erlang B formula deals with data loss in relation with  Class of service providing. network load. Erlang C formula defines probability of  QoS guarantee. inserting data into waiting queues and so resembles to IP network behavior, where data queuing occurs before 1.2. VBR Video sending further. Because video is basically only a slideshow of pictures 1.1. QoS in IP Networks displayed at sufficient frequency, it is necessary to com- press video flow. Common video flow has a frame rate Increasing number of user requests for application and of 23-30 frames per second [6]. Different lossmaking and multimedia services was an impulse for development of also lossless methods are used for each frame. However, protocols that can assure QoS within IP network. This compression of individual frames is not a final solution. way of requirements has risen not only for network func- CBR (Constant Bit Rate) is a method of saving frames tionality, but also for transfer parameters observance. If only in compressed form. This data flow does not change these QoS parameter requirements are observed, IP net- its bandwidth requirements, because same type of com- work can even out ISDN (Integrated Services Digital pression is applied to every frame. With this type of Network) or ATM (Asynchronous Transfer Mode) net- video flow we always have complete picture available Copyright © 2011 SciRes. CN
  • 2. 162 E. CHROMY ET AL. and there is no need to use methods for combining more feature. Labeled packets of video flow then will be con- pictures together. centrated into one link or divided. We will install a cus- VBR (Variable Bit Rate) – this special data flow uses tom package for traffic engineering, where classes, several type of frames. Position of frame in the video queues and filters can be created. These three main ele- plays important role and it uses differences between pic- ments are defining routing mechanisms in router. This tures. This video flow does not produce data flow of type of server with OS linux installed can be a low price constant bandwidth (it changes in relation to frame dif- alternative to routers used in commercial networks. ferences). This flow can consist of these types of frames:  Information frame (key frame) – CBR consists only 2.1. IP Tables from these frames.  Prediction frame. IP tables is a mechanism implemented directly into core  Differential frame. of Linux operating system and serves for setting of IP traffic rules. It can change headers or drop packets. In 1.3. Waiting Queue Systems our case, it will be used only for packet labeling. Labeled packets can be separated into individual data flows and WQS (waiting queue systems) are systems with input then formed by traffic engineering package. IP tables requirements, service times, queues and other system consist of three parts: incoming, outgoing and forward- properties [7-9]. Basic properties of WQS are defined as ing. We can insert rules into these groups. If packets follows: passes first rule, other rules in chain are not tested and WQS   A, B, X , Y , Z , V  (1) packet is processed with the first rule definitions. For example, it can be labeled or dropped. where these symbols mean following:  A – arrival process: 2.2. Classes ♦ M – poisson distribution, ♦ Ek – Erlang distribution, or keeping our defined bandwidths. If we want to reduce ♦ D – deterministic distribution, speed to 2Mbit/s, we can create a class that ensure, that ♦ G – any empirical distribution. overflowed data will go to a queue and then will be sent.  B –service time distribution. Linux uses two common classes:  X – number of parallel service channels.  CBQ (Classfull Based Queuing).  Y – maximum number of requests in source,  HTB (Hierarchy Token Bucket) [14].  Z – maximum queue length.  V – type of queuing. 2.3. Queues WQS are also divided into types with and without feedback. Systems with feedback are called closed sys- Queues in traffic engineering influence which data will tems, when request is returned back. If only part of the be send and which will have to wait in queue. There exist service requests is returned back, these systems are hy- many mechanisms for queue managing and they are as- brid systems. These hybrid types are mostly used in signed to CBQ or HTB. Queues are class independent. praxis. Basic configuration of Traffic control package includes following types of queues: 2. Simulation Environment  FIFO (First in First Out).  PFIFO (Priority FIFO). Linux is an open-source operating system (OS). It has  SFQ (Stochastic Fairness Queuing). gained a lot of fans mostly because of its low system  RED (Random Early Detection). requirements, wide modularity and openness. In this system every part of the core is documented and avail- 2.4. Filters able [10-13]. Thanks to this attribute, OS Linux or its core is implemented in many devices (routers). In our Last and very important parts of our flow regulation case we used linux distribution Debian 4.0, installed it on package are filters. Filter serves for inserting data into a PC that serves as a router, web server, file server and the right class. In our case, filter chooses class by lables other applications server. There will also be installed a that were added by IP tables. But also these filters can simulation program for traffic simulation, that will send analyze packet headers and assign data to right classes. video flows of defined parameters. Linux is capable of These filters are paired with main classes and classes packet modification from its core and we will use this then insert data correctly based on corresponding filters. Copyright © 2011 SciRes. CN
  • 3. E. CHROMY ET AL. 163 2.5. Designed Model Environment Our designed model of simulation environment is shown in Figure 1. We used one client for creation of video traffic and two clients for receiving and video data proc- essing. Whole communication ran through server, which stood as a router and traffic shaper. This network was built and configured based on knowledge from literature [14-18]. All network elements were capable of 1GBit/s (if we did not use server for link limitation, we would not be able to correctly measure IP network behavior under load). 2.6. VBR Video Model For real traffic simulation in IP network, simple model with JPG frame compression is sufficient for our pur- poses. As video source was used a webcam. It captured one minute long recording, all measurements used same data and so results were comparable. Our model is shown in Figure 2 and was designed based on informa- Figure 2. Video model with VBR data flow. tion from [19-21]. der link load [22]. Its basic form is (2): 3. Erlang Formulas in MATLAB C e  * In 1917 Agner Kralup Erlang published Solution of some B  E1,C     C !   * E1,C 1    (2) C  x C   * E1,C 1    Probléme in the Theory of Probabilities of Significance  e  * x ! in Automatic Telephone Exchanges. In this publication x 0 he stated his formulas for loss and waiting time in te- Symbol meanings are: lephony traffic.   - total load [%],  C - number of links. 3.1. Erlang B Formula We revised formula (2) into form (3), which is more appropriate for calculations. From this formula results Erlang B formula deals with probability of data loss un- relation of two parameters:   - link load in [%],  C - link speed in Mbit/s. C E1  CC ! k (3)   k! k 0 Figure 3. Data loss probability in the case of constant Figure 1. Tested model. bandwidth. Copyright © 2011 SciRes. CN
  • 4. 164 E. CHROMY ET AL. From Figure 3. results:  Probability of loss increases with link load.  With increasing bandwidth data loss is decreasing. After revision and modification of Erlang formula with parameter m, (number of sources in common path) we used formula (4) for further calculations. Other pa- rameters stayed the same.  m.  c E1   , c, m   c! (4) Figure 5. Probability of insertion into waiting queue in case c  m.  i of constant bandwidth.  i 0 i !  With low link speeds (under 16 Mbit/s), the behav- Common path means that more flows are transferred iour of probabilities is nearly linear. through one way. Link bandwidth requirements are then Formula (6) extended by m parameter: summarized together. From Figure 4. results: E2,C  m *    Under low link load with increasing number of m *   Ccp Ccp sources is data loss probability reduced. *  Under higher link load (5%) this difference is not as Ccp ! Ccp   m *   (7)  m*   m *   Ccp 1 x Ccp much notable and the loss is gradually flatten. Ccp  x!  Ccp ! * Ccp   m *   x 0 3.2. Erlang C Formula Where: Probability of waiting the requests in queue is described   - link load [%]. by second Erlang formula (5).  Ccp – link speed (for common path) in Mbit/s.  m – number of sources. C C From Figure 6. results: * C! C    With increasing link load and constant bandwidth, the E2,C     C 1 (5) x C C probability of insertion into waiting queue increases.  x!  * C! C    With higher common path utilization, the probability x 0 of insertion into waiting queue is also higher. For calculations, a form without factorials is prefer-  With increasing of common path bandwidth, it is able. In case that   C , we can rewrite formula to (6). possible multiple use of traffic links also with higher C load. E2,C  E1,C * (6)  Common path bandwidth affects slope of probability C   1  E1,C       of insertion into waiting queue. From Figure 5. results:  With increasing link load, probability of insertion into 4. Results Comparison waiting queue also increases.  With increasing bandwidth, probability of insertion When comparing results from MATLAB simulations and into waiting queue decreases. real measurements, it is necessary to consider VBR video characteristics and used queues for traffic shaping. For Figure 4. Data loss probability in the case of constant Figure 6. Probability of insertion into waiting queue in case bandwidth 2 Mbit/s and m flows. of common usage of 4 Mbit/s link. Copyright © 2011 SciRes. CN
  • 5. E. CHROMY ET AL. 165 simulation of formula B we used RED mechanism, be- cause packets were dropped after reaching maximum queue length. Formula C uses SFQ mechanism, which does not drop packets, but inserts them into waiting queue. 4.1. Erlang B Formula Firstly we measured loss in relation to link load at 2 Mbit/s, 4 Mbit/s and 8 Mbit/s link capacity. In Figure 7. we can see that graphs look like in simulations (section 3.1), but values of loss are much lower (loss decreases Figure 9. Loss probability in case of 4 Mbit/s bandwidth with link capacity). This is caused by VBR video char- and m flows. acteristics, where loss does not occurs until reaching link capacity. Next testing of formula B was by common usage of the link (Figures 8, 9 and 10). Each flow was transferred with some time delay against other flows. This way we prevented overloading of the link by VBR video. From this measurement results:  With constant network load and increasing bandwidth it is possible to raise the number of sources.  With constant load and bandwidth, loss increases with number of sources per link. Figure 10. Loss probability in case of 8 Mbit/s bandwidth  With increasing link capacity we can add number of and m flows. sources per one path. cept for the fact, that data which came later, were labeled 4.2. Erlang C Formula as loss, because they went to waiting queue. From Figure 11. results: The method was the same as with Erlang B formula, ex-  SFQ waiting queue is a better choice for VBR video, because of its better handle with high-peak rate .  Compared to MATLAB simulations, loss is under 5% even until full network usage. This is caused by SFQ queue and VBR data model. We also tried common path usage with Erlang C for- mula (Figures12, 13 and 14.). Flows were put together in the same way as with Erlang B formula. Simulation results:  Graphs are now comparable with MATLAB simula- tions (the curves look similar), but with lower prob- ability of loss. Figure 7. Loss probability in case of constant bandwidth. Figure 8. Loss probability in case of 2 Mbit/s bandwidth and m flows. Figure 11. Loss probability in case of constant bandwidth. Copyright © 2011 SciRes. CN
  • 6. 166 E. CHROMY ET AL. video data flow. We have showed the difference between two link shaping methods and we found out that SFQ is more appropriate for usage. Erlang formula is then a good choice for VBR data flow calculations with respect to loss dependencies. It is possible to estimate network behavior under load with these formulas. These formulas give us only approximately estimation. Loss probabilities were not exactly as predicted by calculations, but lower. It is caused by VBR video characteristics and data trans- fer method in IP networks. Calculations and real meas- urements have shown advantages of effective link load. Putting more VBR flows together into one link has Figure 12. Loss probability in case of m flows and 2 Mbit greatly improved effectiveness of data transfer. bandwidth. 6. Acknowledgements This work is a part of research activities conducted at Slovak University of Technology Bratislava, Faculty of Electrical Engineering and Information Technology, Department of Telecommunications, within the scope of the projects VEGA No. 1/0565/09, Modelling of traffic parameters in NGN telecommunication networks and services and ITMS 26240120029 “Support for Building of Centre of Excellence for SMART technologies, sys- tems and services II”. Figure 13. Loss probability in case of m flows and 4 Mbit 7. References bandwidth. [1] L. Dostálek and A. Kabelová, “Understanding TCP/IP,” Packt, Birmingham, 2006. [2] A. Kováč, M. Halás and M. Vozňák, “Impact of Jitter on Speech Guality Estimation in Modified E-Model,” 12th International Conference Research in Telecommunica- tion Technology, Velké Losiny, 8-10 September 2010, p. 225. [3] T. Mišuth and I. Baroňák, “Performance Forecast of Contact Centre with Differently Experienced Agents,” Elektrorevue, Vol. 15, No. 97, 2010. [4] I. Baroňák and J. Mičuch, “Preventive Methods Support- ing QOS in IP,” New Information and Multimedia Tech- nologies. NIMT – 2009, Brno University of Technology, Brno, 17-18 September 2009, pp. 15-23. Figure 14. Loss probability in case of m flows and 8 Mbit bandwidth. [5] T. Balogh, D. Luknárová and M. Medvecký, “Perform- ance of Round Robin-Based Queue Scheduling Algo- rithms,” The Third International Conference on Commu-  Similar to Erlang B formula, it is useful to put to- nication Theory, Reliability and Quality of Service, Ath- gether more flows into one path. ens, 13-19 June 2010, pp. 156-161.  With increasing bandwidth, we can put together more [6] C. Wootton, “A Practial Guide to Video and Audio flows into one path and assure acceptable loss (based Compression,” Focal Press, Oxford, 2005. on SLA). [7] Š. Peško, “System Queuing Theory,” 2001. http://frcatel.fri.uniza.sk/users/pesko/OA2/oa2m.pdf 5. Conclusions [8] J. F. Hayes, et al., “Modeling and Analysis of Telecom- munications Networks,” Wiley Interscience, New York, The purpose of this work was to evaluate utilization of 2004. Erlang B and C formulas in IP environment with VBR [9] V. B. Iversen, “Teletraffic Engineering Handbook,” Copyright © 2011 SciRes. CN
  • 7. E. CHROMY ET AL. 167 COM Centre, Technical University of Denmark, Copen- [16] G. Davies, “Designing and Developing Scalable IP Net- hagen, 2001. work,” John Wiley & Sons Ltd, Hoboken, 2004. [10] T. Graf, G. Maxwell and R. Mook, “Linux Advanced [17] G. Held, “Ethernet Networks–Fourth Edition,” John Routing & Traffic Control,” 2004. Wiley & Sons Ltd, Hoboken, 2003. http://lartc.org/. [18] S. Plumley, “Home Networking Bible,” John Wiley & [11] K. Thomas, “Beginning Ubuntu Linux from Novice to Sons Ltd, Hoboken, 2004. Professional,” Apress, New York City, 2006. [19] V. Pirogov, “Mastership in Assembler Language,” Com- [12] M. Bauer, “Building Secure Servers with LINUX,” puter Press, Brno, 2005. O’Reilly Media, Sebastopol, 2003. [20] J. Pirkl, “Network programming in Windows and internet [13] S. Hunger, “Debian GNU-Linux Bible,” Hungary Minds, programming,” Kopp, České Budějovice, 2001. New York, 2001. [21] R. Chalupa, “1001 tips and tricks for Visual C++,” [14] A. Kist, “Erlang B as a Performance Model for IP Flows Computer Press, Brno, 2003, ISBN 1-904811-71-0. Networks,” 15th IEEE International Conference on Net- [22] I. Baroňák, “Lecture on Switching Systems II,” 08/09, works, Adelaide, 19-21 November 2007, pp. 37-41. FEI STU Bratislava. [15] M. Hofmann and L. Beaumont, “Content Networking,” http://www.ktl.elf.stuba.sk/~baronak/PEDAGOGIKA.ht MK Publishers, St Petersburg, 2005, pp. 834-836. m Copyright © 2011 SciRes. CN