SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012
DOI : 10.5121/ijcseit.2012.2504 37
DIFFERENTIATED SERVICES ENSURING QOS ON
INTERNET
Pawansupreet Kaur1
, Monika Sachdeva2
and Gurjeet Kaur3
1
Department of Computer Engineering, SBS State Technical Campus, Ferozpur, Punjab
Meens399@gmail.com
2
Department of CSE, Associate Proff at SBS State Technical Campus, Ferozpur, Punjab
Monika.sal@rediffmail.com
3
Department of Computer Engineering, SBS State Technical Campus, Ferozpur, Punjab
Gurjeetrandhawa4@gmail.com
ABSTRACT
Differentiated Services is the most advanced method for traffic management which provides QoS. QoS is
essential for today’s internet. QoS represents set of techniques necessary to manage throughput, packet
loss and delay. Traffic Conditioners or Policers are the most important components of differentiated
services. In this research, different Traffic Conditioners or Policers are compared on the basis of QoS
parameters (Performance metrics) which are throughput, packet loss and delay to provide QoS on internet.
Traffic classification and traffic conditioning are important functions of differentiated services also known
as admission control which are governed by service level agreement (SLA). Traffic classification and traffic
conditioning is done by traffic conditioners at edge routers. Goal of this research is to choose the best
Traffic Conditioner to apply from source to destination pair because only one traffic conditioner can be
applied from source to destination so that QoS can be guaranteed.
KEYWORDS
Differentiated Services, Performance Metrics, QoS, Traffic Conditioners or Policers
1. INTRODUCTION
The Internet was designed as a best effort network for transporting computer-to-computer traffic.
However, as the footprint of the Internet grew, a wide variety of applications emerged. The
growth in the diversity and volume of Internet applications made it essential to discover and
implement new techniques that support different levels of service for different classes of traffic.
These techniques are collectively referred to as Quality of Services (QOS) techniques.
Differentiated Services [1] was introduced in the late 1990s in response to the need for a simple,
yet effective QOS mechanism suitable for implementation on the Internet. Differentiated services
has been proposed as an efficient and scalable traffic management mechanism way to ensure
internet QOS. QoS is the classification of packets for the purpose of treating certain classes or
flows of packets in a particular way as compared to the other packets. Various solutions have
been proposed to guarantee QoS. In 1997 IETF proposed an architecture that is Differentiated
Services architecture. The Differentiated Services (Diff Ser) network architecture attempts to
provide these QoS guarantees in the most scalable and least complex manner. The Diff Ser
approach is based on a set of simple mechanisms that treat packets differently according to the
marking of the DS field in the IP header [2]. In differentiated services, complexity is pushed at
edge routers with core remains with simple functionality. Packets are marked with different
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012
38
Traffic Conditioners or Policers at edge routers to receive particular behaviour. My research work
focus on these traffic conditioners. Five different traffic conditioners are selected for the
comparison. These Traffic Conditioners or Policers are compared on the basis of different
Performance metrics. Differentiated Services are implemented with NS2 Simulator. One of the
Differentiated Services packet forwarding treatments [3], Assured Forwarding PHB [4] is
implemented in this research work. The Differentiated Services Assured Forwarding (AF) Per-
Hop Behaviour Group defines a differentiated forwarding of packets in four independent classes,
having three levels of drop precedence.
2. TRAFFIC CONDITIONERS AND PERFORMANCE METRICS
A traffic conditioner may contain meters, markers, shapers and droppers for traffic conditioning
functions. The conditioner may re-mark a traffic stream or may discard or shape packet to alter
the temporal characteristics of the stream and bring it into compliance with a traffic profile
specified by the network administrator.
2.1. Traffic Conditioners
Traffic Conditioners are most important components of differentiated services. Packets are
marked with different Traffic Conditioners or Policers at edge routers to receive particular
behaviour which are (1) TSW2CM (2) TSW3CM (3) Token Bucket (4) srTCM (5) trTCM
2.1.1. TSW2CM (Time Sliding Window Two Colour Marker)
TSW2CM uses a CIR and two drop precedence. The lower one is used probabilistically when
CIR is exceeded.
2.1.2. TSW3CM (Time Sliding Window Three Colour Marker)
TSW3CM [5] uses a CIR, and PIR and three drop precedence. When the measured traffic is
below the CIR, packets are marked with low drop precedence. If the measured traffic exceeds its
CIR, packets are marked with medium drop precedence. If the traffic exceeds its PIR, packets are
marked with highest drop precedence.
2.1.3. Token Bucket
Token Bucket [6] uses a CIR and CBS, and two drop precedence. The token bucket marker
(TBM) meters a traffic stream based on two parameters: CIR (committed information rate) and
CBS (committed burst size). The meter is specified in terms of a token bucket with size CBS and
token generation rate CIR. Tokens are generated at a rate equal to the CIR and are added to the
token bucket provided it is not full.
2.1.4. srTCM (Single Rate Three Colour Marker)
srTCM [7] uses a CIR, CBS and EBS to choose from three drop precedence.
2.1.5. trTCM (Two Rate Three Colour Marker)
trTCM [8] uses a CIR, CBS, EBS, and PBS to choose from three drop precedence.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012
39
2.2. Performance Metrics
2.2.1. Throughput
Throughput is a generic term used to describe the capacity of the system to transfer data.
Throughput is nothing but the bandwidth of the transmission channel. Throughput is the rate at
which network sends or receives data. Throughput is calculated using packets received divided by
packets forwarded.
Throughput = Packets received / Packets forwarded
2.2.2. End To End Delay
Delay is the amount of time that it takes for a packet to be transmitted from one point in network
to another point in a network. It refers to the time taken for a packet to be transmitted across a
network from source to destination.
2.2.3. Packet Loss
Packet loss is where network traffic fails to reach its destination in a timely manner.
Packet Lost = amount of packets received - amount of packets forwarded
3. SIMULATION ENVIRONMENT
In this research paper, we are comparing different traffic conditioners for the TCP type traffic.
Differentiated Services are implemented in NS2 Simulator. Different traffic conditioners are
configured with same configuration parameters for better analysis. First, we have created a
topology. Then traffic pattern has been defined for that topology. Second Traffic Conditioners are
configured on ingress edge routers. Packet scheduling mechanism FIFO is implemented at egress
edge routers. RED with IN/OUT (RIO), a differentiated dropping algorithm is used in interior
routers. Our simulation is done with TCP type traffic for 20 source nodes which are generating
traffic at same rate. Each source node is connected to a corresponding edge node where traffic is
marked according to the parameters that will be specified. The edge routers are connected to a
bottleneck core router and then through another edge router, to a destination node. Links between
the edge nodes and corresponding source nodes have delays of 10 µsec and 6Mbps bandwidth.
Links between the edge nodes and corresponding destination nodes have delays of 10 µsec and
10Mbps bandwidth. Links between the core node and edge nodes that are attached to the sources
have delays of 0.1 msec and 6Mbps bandwidth. Links between the core node and edge node that
are attached to the destination has delays of 1 msec and 10Mbps bandwidth. Queues can be built
at the bottleneck router, i.e. at the link between the core node and the edge node that connects to
the destination. We choose its size to be of 100 packets. . In the bottleneck queue at the core node,
a multi-RED queue management is used with a RIO-D version. Figures1 represents the network
topology which is used for simulating differentiated services. There are 20 source nodes which
are generating traffic at the same rate.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012
40
Fig 1: Network topology
4. SIMULATION RESULTS
In this section, we present the simulation results with different traffic conditioners that we have
described in the previous section. The simulation is done with discrete event simulation namely
ns2 version 2.34. Models in ns are created by defining nodes and connecting them with links to
form some network topology
4.1. Throughput
Fig 2: Throughput
Simulation time (sec)
Throughputofgenerating
packets
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012
41
The minimum assured throughput is given according to the negotiated profile with the client.
TSW2CM, Token Bucket and srTCM bears almost same variation. In case of TSW3CM
throughput is high at start, then it becomes constant. In case of trTCM, throughput is high at start
and after that it starts decreasing because throughput increases as long as there are available
resources and decreases when congestion occurs. Secondly source is generating traffic at more
rate than committed rate. So more packets were marked as out-of-profile i.e when congestion
occurs these can be dropped. In case of srTCM, throughput bears different variations, at some
point it is high and then suddenly decreases and then again starts increasing and at the end
throughput is high because in this case we have more options to mark the packets so We can
assign different drop precedences to different packets. srTCM gives high throughput.
4.2. Packet Loss
Packet Statistics are shown in the tables.
Table 1. TSW2CM
CP TotPkts TxPkts Ldrops edrops
All 60593 58892 140 1561
10 14633 14633 0 0
11 45960 44259 140 1561
Table 2. TSW3CM
CP TotPkts TxPkts Ldrops Edrops
All 60449 58904 125 1420
10 14751 14751 0 0
11 39573 44259 125 1420
12 6125 6125 0 0
Table 3. Token Bucket
CP TotPkts TxPkts Ldrops edrops
All 60433 58653 136 1644
10 14630 14630 0 0
11 45803 44023 136 1644
Table 4. srTCM
CP TotPkts TxPkts Ldrops edrops
All 59603 58734 153 716
10 4027 4014 13 0
11 31471 30683 72 716
12 24105 24037 68 0
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012
42
Table 5. trTCM
CP TotPkts TxPkts Ldrops edrops
All 60495 58521 181 1793
10 5332 5332 0 0
11 55163 53189 181 1793
CP stands for code point, TotPkts are amount of total forwarded packets and TxPkts are amount
of total received packets. Ldrops are link drops and edrops are those drops which are due to early
detection. Packet loss is calculated using formula (Packet Loss = amount of packets received –
amount of packets forwarded). In TSW2CM, total Packet Loss is 1701. Link drops are 140 and
edge drops i.e. drop because of early detection are 1561. Edrops are more than ldrops because
more traffic handling is done at edge routers and if packets exceed than its SLA or TCA then they
are dropped at edge routers. Packets marked with code point 10 were marked with low drop
precedence so packet loss is less than packets marked with code point 11 which is marked as high
drop precedence. It means packets marked with high drop precedence are discarded first than
packets marked with low drop precedence in case of congestion. In case of TSW3CM, total
packet loss is 1439. In case of Token Bucket, total packet loss is 1780. In case of srTCM, total
packet loss is 869.. In case of trTCM, total packet loss is 1780. srTCM drops much less packets as
compared to other policers.
Fig 3: Packet Loss
4.3 End To End Delay
Delay is the amount of time that it takes for a packet to be transmitted from one point in network
to another point in a network. End to End delay for different policers is shown in table. For real
time application or critical applications end to end delay should be less. Lesser the end to end
delay, more will the Quality.
NumberofPacketslost
Simulation time
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012
43
Figure 4. End to End delay
End to End delay for all Traffic Conditioners is shown in the graph corresponding to the
simulation time. End to End delay bears large variation in the graph, somewhere it is more and
somewhere it is less. End to end delay for TSW2CM is initially 0.05 then it drops to 0.01 and
then again more and at the end to end delay is 0.046. In case of TSW3CM, end to end delay
initially is 0.043 and at the end it is 0.00608. End to End delay for TSW3CM is much less as
commpared to TSW2CM. That means among TSW group, TSW3CM is better than TSW2CM
when comapred according to end to end delay metric.In case of Token Bucket, end to end delay
initially is 0.038, and at the end it is 0.041. In cae of srTCM, end to end delay initially is 0.0395,
and at the end it is 0.0403. In case of trTCM, Initially end to end delay is 0.0123 and at the end it
is 0.05. Among Token Bucket group srTCM has less end to end delay as compared to Token
Bucket and trTCM. And among TSW3CM and srTCM , srTCM provides less end to end delay.
4.4. Combination and Overall Performance
Table 6. Overall Performance
Traffic Conditioners Packet Loss End to End delay Throughput
TSW2CM 1701 0.00811 0.971
TSW3CM 1439 0.00810 0.976
Token Bicket 1780 0.00848 0.970
srTCM 869 0.00114 0.98
trTCM 1974 0.0123 0.96
EndtoEndDelay
Simulation time
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012
44
5. CONCLUSIONS
All traffic conditioners are different from each other through target rate or configuration
parameters by which traffic can be marked differently. When performance was measured in terms
of target rate parameters, there was no convincing evidence to suggest that the choice of traffic
conditioner affects a source’s achieved rate. Therefore, if a network designer is only interested in
the relative target rate performance of the traffic conditioners, then he is free to choose any one of
the traffic conditioners. When Traffic Conditioners are compared based on throughput then all
Conditioners gives almost equal throughput because all the conditioners are configured with same
parameters as we are implementing Assured Services, Assured Services are guaranteed to provide
minimum throughput in case of congestion also. srTCM gives high throughput as compared to
others. When Traffic Conditioners are compared according to packet loss, then among TSW
group, TSW3CM drops fewer packets and if compared among Token bucket group then srTCM
drops fewer packets. When Traffic Conditioners are compared based on End- to-End Delay then
token bucket based srTCM experiences less delay and TSW3CM among TSW group bears less
delay. TSW3CM and srTCM gives better performance then other policers. If to choose among
TSW3CM and srTCM then srTCM gives better performance and provide QoS requirements i.e.
Less delay, less packet loss and more throughputs. srTCM is best to choose.
REFERENCES
[1] Blake, S. Black, D. Carlson, M. Davies, E. Wang, Z. and Weiss, WS. (2008) “An architecture for
Differentiated Services”, RFC 2475.
[2] Nichols, K. (1998) “Definition of Differentiated Services Field (DS Field) in the IPv4 and IPv6
Headers”, RFC 2474.
[3] Brim, S. Carpenter, B. and Faucheur, F.le ( 2000) “Per Hop Behavior Codes”, RFC 2836 .
[4] Heinanen, J. Baker, F. Weis, and W. Wroclawski, J. (1999) “Assured forwarding PHB Group”.
[5] Fang, W. Seddigh, N. and Nandy, B. (2000) “Time Sliding Window Three Color Marker
(TSW3CM)”, RFC 2859.
[6] Heinanen, J. and Guerin, R. (2000) “A Single Rate Three Color Marker”, RFC 2697.
[7] Stallings, W. (1999) “High Speed Networks: TCP/IP and ATM Design Principles”, Prentice Hall
Englewood cliffs, NZ.
Authors
Pawansupreet Kaur was born in Ferozepur, Punjab, on July 23, 1989. Pawansupreet
Kaur received her Bachelor of Technology and Engineering Degree from Adesh Institute
of Engineering and Technology, Punjab, India. Currently she is doing Masters in
Computer Science and Engineering from Shaheed Bhagat Singh State Technical Campus,
Ferozepur, Punjab, India. Her Research Interest are in the areas of Networking and
Mobile Telecommunication. Miss Pawansupreet Kaur is member of UACEE.
Monika Sachdeva has done Btech in computer Science Engineering from National
Institute of Technology (NIT), Jalandhar in 1997. She has done her MS software
systems from BITS pilani in 2002. She has done her Phd in Computer Science and
Engineering from Guru Nanak Dev University, Amritsar, Punjab, India in 2012.
Gurjeet Kaur was born in Pehowa, Haryana, on December 1, 1986.Gurjeet Kaur
received her Bachelor of Technology degree in Computer Science and Engineering from
Adesh Institute Of Engineering & Technology, Punjab,India. Currently she is doing
Master’s in Computer Science & Engineering from Shaheed Bhagat Singh State
Technical campus, Ferozepur, Punjab, India. Her research interests are in the area of
Telecommunication Networks (GSM Security), Location Based Services. Miss Gurjeet
Kaur is member of UACEE and SDIWC.

More Related Content

What's hot

Protocol based QoS Estimation of OFDM-WIMAX Network
Protocol based QoS Estimation of OFDM-WIMAX NetworkProtocol based QoS Estimation of OFDM-WIMAX Network
Protocol based QoS Estimation of OFDM-WIMAX Networkidescitation
 
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...Georgios Giannakopoulos
 
Alternatives to Redistribution Communities in Inter-domain traffic Engineering
Alternatives to Redistribution Communities in Inter-domain traffic Engineering Alternatives to Redistribution Communities in Inter-domain traffic Engineering
Alternatives to Redistribution Communities in Inter-domain traffic Engineering cscpconf
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...eSAT Publishing House
 
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)IRJET Journal
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928IJRAT
 
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferImproved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferEswar Publications
 
Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network IJECEIAES
 
A comparative analysis on routing
A comparative analysis on routingA comparative analysis on routing
A comparative analysis on routingijcseit
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET Journal
 
Dsr aodv performance
Dsr aodv performanceDsr aodv performance
Dsr aodv performanceGilles Samba
 
Optimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVOptimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVTELKOMNIKA JOURNAL
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...cscpconf
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionijasuc
 

What's hot (18)

Protocol based QoS Estimation of OFDM-WIMAX Network
Protocol based QoS Estimation of OFDM-WIMAX NetworkProtocol based QoS Estimation of OFDM-WIMAX Network
Protocol based QoS Estimation of OFDM-WIMAX Network
 
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
How to Dimension Wireless Networks for Packet Data Services with Guaranteed Q...
 
Alternatives to Redistribution Communities in Inter-domain traffic Engineering
Alternatives to Redistribution Communities in Inter-domain traffic Engineering Alternatives to Redistribution Communities in Inter-domain traffic Engineering
Alternatives to Redistribution Communities in Inter-domain traffic Engineering
 
A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...A novel approach of hybrid multipath routing protocol for manets using receiv...
A novel approach of hybrid multipath routing protocol for manets using receiv...
 
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
Concurrent Multi - Path Real Time Communication Control Protocol (Cmprtcp)
 
Ijcnc050204
Ijcnc050204Ijcnc050204
Ijcnc050204
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Paper id 71201928
Paper id 71201928Paper id 71201928
Paper id 71201928
 
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferImproved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
 
Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network Two-level scheduling scheme for integrated 4G-WLAN network
Two-level scheduling scheme for integrated 4G-WLAN network
 
A comparative analysis on routing
A comparative analysis on routingA comparative analysis on routing
A comparative analysis on routing
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
 
Dsr aodv performance
Dsr aodv performanceDsr aodv performance
Dsr aodv performance
 
Optimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVOptimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADV
 
94
9494
94
 
H01115155
H01115155H01115155
H01115155
 
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
EVALUATION OF PROACTIVE, REACTIVE AND HYBRID AD HOC ROUTING PROTOCOL FOR IEEE...
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
 

Similar to DIFFERENTIATED SERVICES ENSURING QOS ON INTERNET

NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...ijngnjournal
 
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKA COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKijcseit
 
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKA COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKijcseit
 
An Effective approach to control Inter-domain Traffic Engineering among Heter...
An Effective approach to control Inter-domain Traffic Engineering among Heter...An Effective approach to control Inter-domain Traffic Engineering among Heter...
An Effective approach to control Inter-domain Traffic Engineering among Heter...ijistjournal
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...ijwmn
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...ijwmn
 
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Dr Sandeep Kumar Poonia
 
Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...IJECEIAES
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presenceiaemedu
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAIJITE
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...ijp2p
 
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...CSCJournals
 

Similar to DIFFERENTIATED SERVICES ENSURING QOS ON INTERNET (20)

NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
NETWORK PERFORMANCE EVALUATION WITH REAL TIME APPLICATION ENSURING QUALITY OF...
 
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKA COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
 
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORKA COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
A COMPARATIVE ANALYSIS ON ROUTING PROTOCOLS OF MOBILE AD HOC NETWORK
 
An Effective approach to control Inter-domain Traffic Engineering among Heter...
An Effective approach to control Inter-domain Traffic Engineering among Heter...An Effective approach to control Inter-domain Traffic Engineering among Heter...
An Effective approach to control Inter-domain Traffic Engineering among Heter...
 
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
 
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
Performance Comparison and Analysis of Proactive, Reactive and Hybrid Routing...
 
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...
 
2 sima singh-6-13
2 sima singh-6-132 sima singh-6-13
2 sima singh-6-13
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...
 
Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...Performance evaluation of dynamic source routing protocol with variation in t...
Performance evaluation of dynamic source routing protocol with variation in t...
 
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presence
 
Na2522282231
Na2522282231Na2522282231
Na2522282231
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIAENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
ENHANCING STUDENTS’ LEARNING AND SATISFACTION THROUGH THE USE OF SOCIAL MEDIA
 
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
Application of N jobs M machine Job Sequencing Technique for MPLS Traffic Eng...
 
P01754110117
P01754110117P01754110117
P01754110117
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 

DIFFERENTIATED SERVICES ENSURING QOS ON INTERNET

  • 1. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012 DOI : 10.5121/ijcseit.2012.2504 37 DIFFERENTIATED SERVICES ENSURING QOS ON INTERNET Pawansupreet Kaur1 , Monika Sachdeva2 and Gurjeet Kaur3 1 Department of Computer Engineering, SBS State Technical Campus, Ferozpur, Punjab Meens399@gmail.com 2 Department of CSE, Associate Proff at SBS State Technical Campus, Ferozpur, Punjab Monika.sal@rediffmail.com 3 Department of Computer Engineering, SBS State Technical Campus, Ferozpur, Punjab Gurjeetrandhawa4@gmail.com ABSTRACT Differentiated Services is the most advanced method for traffic management which provides QoS. QoS is essential for today’s internet. QoS represents set of techniques necessary to manage throughput, packet loss and delay. Traffic Conditioners or Policers are the most important components of differentiated services. In this research, different Traffic Conditioners or Policers are compared on the basis of QoS parameters (Performance metrics) which are throughput, packet loss and delay to provide QoS on internet. Traffic classification and traffic conditioning are important functions of differentiated services also known as admission control which are governed by service level agreement (SLA). Traffic classification and traffic conditioning is done by traffic conditioners at edge routers. Goal of this research is to choose the best Traffic Conditioner to apply from source to destination pair because only one traffic conditioner can be applied from source to destination so that QoS can be guaranteed. KEYWORDS Differentiated Services, Performance Metrics, QoS, Traffic Conditioners or Policers 1. INTRODUCTION The Internet was designed as a best effort network for transporting computer-to-computer traffic. However, as the footprint of the Internet grew, a wide variety of applications emerged. The growth in the diversity and volume of Internet applications made it essential to discover and implement new techniques that support different levels of service for different classes of traffic. These techniques are collectively referred to as Quality of Services (QOS) techniques. Differentiated Services [1] was introduced in the late 1990s in response to the need for a simple, yet effective QOS mechanism suitable for implementation on the Internet. Differentiated services has been proposed as an efficient and scalable traffic management mechanism way to ensure internet QOS. QoS is the classification of packets for the purpose of treating certain classes or flows of packets in a particular way as compared to the other packets. Various solutions have been proposed to guarantee QoS. In 1997 IETF proposed an architecture that is Differentiated Services architecture. The Differentiated Services (Diff Ser) network architecture attempts to provide these QoS guarantees in the most scalable and least complex manner. The Diff Ser approach is based on a set of simple mechanisms that treat packets differently according to the marking of the DS field in the IP header [2]. In differentiated services, complexity is pushed at edge routers with core remains with simple functionality. Packets are marked with different
  • 2. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012 38 Traffic Conditioners or Policers at edge routers to receive particular behaviour. My research work focus on these traffic conditioners. Five different traffic conditioners are selected for the comparison. These Traffic Conditioners or Policers are compared on the basis of different Performance metrics. Differentiated Services are implemented with NS2 Simulator. One of the Differentiated Services packet forwarding treatments [3], Assured Forwarding PHB [4] is implemented in this research work. The Differentiated Services Assured Forwarding (AF) Per- Hop Behaviour Group defines a differentiated forwarding of packets in four independent classes, having three levels of drop precedence. 2. TRAFFIC CONDITIONERS AND PERFORMANCE METRICS A traffic conditioner may contain meters, markers, shapers and droppers for traffic conditioning functions. The conditioner may re-mark a traffic stream or may discard or shape packet to alter the temporal characteristics of the stream and bring it into compliance with a traffic profile specified by the network administrator. 2.1. Traffic Conditioners Traffic Conditioners are most important components of differentiated services. Packets are marked with different Traffic Conditioners or Policers at edge routers to receive particular behaviour which are (1) TSW2CM (2) TSW3CM (3) Token Bucket (4) srTCM (5) trTCM 2.1.1. TSW2CM (Time Sliding Window Two Colour Marker) TSW2CM uses a CIR and two drop precedence. The lower one is used probabilistically when CIR is exceeded. 2.1.2. TSW3CM (Time Sliding Window Three Colour Marker) TSW3CM [5] uses a CIR, and PIR and three drop precedence. When the measured traffic is below the CIR, packets are marked with low drop precedence. If the measured traffic exceeds its CIR, packets are marked with medium drop precedence. If the traffic exceeds its PIR, packets are marked with highest drop precedence. 2.1.3. Token Bucket Token Bucket [6] uses a CIR and CBS, and two drop precedence. The token bucket marker (TBM) meters a traffic stream based on two parameters: CIR (committed information rate) and CBS (committed burst size). The meter is specified in terms of a token bucket with size CBS and token generation rate CIR. Tokens are generated at a rate equal to the CIR and are added to the token bucket provided it is not full. 2.1.4. srTCM (Single Rate Three Colour Marker) srTCM [7] uses a CIR, CBS and EBS to choose from three drop precedence. 2.1.5. trTCM (Two Rate Three Colour Marker) trTCM [8] uses a CIR, CBS, EBS, and PBS to choose from three drop precedence.
  • 3. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012 39 2.2. Performance Metrics 2.2.1. Throughput Throughput is a generic term used to describe the capacity of the system to transfer data. Throughput is nothing but the bandwidth of the transmission channel. Throughput is the rate at which network sends or receives data. Throughput is calculated using packets received divided by packets forwarded. Throughput = Packets received / Packets forwarded 2.2.2. End To End Delay Delay is the amount of time that it takes for a packet to be transmitted from one point in network to another point in a network. It refers to the time taken for a packet to be transmitted across a network from source to destination. 2.2.3. Packet Loss Packet loss is where network traffic fails to reach its destination in a timely manner. Packet Lost = amount of packets received - amount of packets forwarded 3. SIMULATION ENVIRONMENT In this research paper, we are comparing different traffic conditioners for the TCP type traffic. Differentiated Services are implemented in NS2 Simulator. Different traffic conditioners are configured with same configuration parameters for better analysis. First, we have created a topology. Then traffic pattern has been defined for that topology. Second Traffic Conditioners are configured on ingress edge routers. Packet scheduling mechanism FIFO is implemented at egress edge routers. RED with IN/OUT (RIO), a differentiated dropping algorithm is used in interior routers. Our simulation is done with TCP type traffic for 20 source nodes which are generating traffic at same rate. Each source node is connected to a corresponding edge node where traffic is marked according to the parameters that will be specified. The edge routers are connected to a bottleneck core router and then through another edge router, to a destination node. Links between the edge nodes and corresponding source nodes have delays of 10 µsec and 6Mbps bandwidth. Links between the edge nodes and corresponding destination nodes have delays of 10 µsec and 10Mbps bandwidth. Links between the core node and edge nodes that are attached to the sources have delays of 0.1 msec and 6Mbps bandwidth. Links between the core node and edge node that are attached to the destination has delays of 1 msec and 10Mbps bandwidth. Queues can be built at the bottleneck router, i.e. at the link between the core node and the edge node that connects to the destination. We choose its size to be of 100 packets. . In the bottleneck queue at the core node, a multi-RED queue management is used with a RIO-D version. Figures1 represents the network topology which is used for simulating differentiated services. There are 20 source nodes which are generating traffic at the same rate.
  • 4. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012 40 Fig 1: Network topology 4. SIMULATION RESULTS In this section, we present the simulation results with different traffic conditioners that we have described in the previous section. The simulation is done with discrete event simulation namely ns2 version 2.34. Models in ns are created by defining nodes and connecting them with links to form some network topology 4.1. Throughput Fig 2: Throughput Simulation time (sec) Throughputofgenerating packets
  • 5. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012 41 The minimum assured throughput is given according to the negotiated profile with the client. TSW2CM, Token Bucket and srTCM bears almost same variation. In case of TSW3CM throughput is high at start, then it becomes constant. In case of trTCM, throughput is high at start and after that it starts decreasing because throughput increases as long as there are available resources and decreases when congestion occurs. Secondly source is generating traffic at more rate than committed rate. So more packets were marked as out-of-profile i.e when congestion occurs these can be dropped. In case of srTCM, throughput bears different variations, at some point it is high and then suddenly decreases and then again starts increasing and at the end throughput is high because in this case we have more options to mark the packets so We can assign different drop precedences to different packets. srTCM gives high throughput. 4.2. Packet Loss Packet Statistics are shown in the tables. Table 1. TSW2CM CP TotPkts TxPkts Ldrops edrops All 60593 58892 140 1561 10 14633 14633 0 0 11 45960 44259 140 1561 Table 2. TSW3CM CP TotPkts TxPkts Ldrops Edrops All 60449 58904 125 1420 10 14751 14751 0 0 11 39573 44259 125 1420 12 6125 6125 0 0 Table 3. Token Bucket CP TotPkts TxPkts Ldrops edrops All 60433 58653 136 1644 10 14630 14630 0 0 11 45803 44023 136 1644 Table 4. srTCM CP TotPkts TxPkts Ldrops edrops All 59603 58734 153 716 10 4027 4014 13 0 11 31471 30683 72 716 12 24105 24037 68 0
  • 6. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012 42 Table 5. trTCM CP TotPkts TxPkts Ldrops edrops All 60495 58521 181 1793 10 5332 5332 0 0 11 55163 53189 181 1793 CP stands for code point, TotPkts are amount of total forwarded packets and TxPkts are amount of total received packets. Ldrops are link drops and edrops are those drops which are due to early detection. Packet loss is calculated using formula (Packet Loss = amount of packets received – amount of packets forwarded). In TSW2CM, total Packet Loss is 1701. Link drops are 140 and edge drops i.e. drop because of early detection are 1561. Edrops are more than ldrops because more traffic handling is done at edge routers and if packets exceed than its SLA or TCA then they are dropped at edge routers. Packets marked with code point 10 were marked with low drop precedence so packet loss is less than packets marked with code point 11 which is marked as high drop precedence. It means packets marked with high drop precedence are discarded first than packets marked with low drop precedence in case of congestion. In case of TSW3CM, total packet loss is 1439. In case of Token Bucket, total packet loss is 1780. In case of srTCM, total packet loss is 869.. In case of trTCM, total packet loss is 1780. srTCM drops much less packets as compared to other policers. Fig 3: Packet Loss 4.3 End To End Delay Delay is the amount of time that it takes for a packet to be transmitted from one point in network to another point in a network. End to End delay for different policers is shown in table. For real time application or critical applications end to end delay should be less. Lesser the end to end delay, more will the Quality. NumberofPacketslost Simulation time
  • 7. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012 43 Figure 4. End to End delay End to End delay for all Traffic Conditioners is shown in the graph corresponding to the simulation time. End to End delay bears large variation in the graph, somewhere it is more and somewhere it is less. End to end delay for TSW2CM is initially 0.05 then it drops to 0.01 and then again more and at the end to end delay is 0.046. In case of TSW3CM, end to end delay initially is 0.043 and at the end it is 0.00608. End to End delay for TSW3CM is much less as commpared to TSW2CM. That means among TSW group, TSW3CM is better than TSW2CM when comapred according to end to end delay metric.In case of Token Bucket, end to end delay initially is 0.038, and at the end it is 0.041. In cae of srTCM, end to end delay initially is 0.0395, and at the end it is 0.0403. In case of trTCM, Initially end to end delay is 0.0123 and at the end it is 0.05. Among Token Bucket group srTCM has less end to end delay as compared to Token Bucket and trTCM. And among TSW3CM and srTCM , srTCM provides less end to end delay. 4.4. Combination and Overall Performance Table 6. Overall Performance Traffic Conditioners Packet Loss End to End delay Throughput TSW2CM 1701 0.00811 0.971 TSW3CM 1439 0.00810 0.976 Token Bicket 1780 0.00848 0.970 srTCM 869 0.00114 0.98 trTCM 1974 0.0123 0.96 EndtoEndDelay Simulation time
  • 8. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012 44 5. CONCLUSIONS All traffic conditioners are different from each other through target rate or configuration parameters by which traffic can be marked differently. When performance was measured in terms of target rate parameters, there was no convincing evidence to suggest that the choice of traffic conditioner affects a source’s achieved rate. Therefore, if a network designer is only interested in the relative target rate performance of the traffic conditioners, then he is free to choose any one of the traffic conditioners. When Traffic Conditioners are compared based on throughput then all Conditioners gives almost equal throughput because all the conditioners are configured with same parameters as we are implementing Assured Services, Assured Services are guaranteed to provide minimum throughput in case of congestion also. srTCM gives high throughput as compared to others. When Traffic Conditioners are compared according to packet loss, then among TSW group, TSW3CM drops fewer packets and if compared among Token bucket group then srTCM drops fewer packets. When Traffic Conditioners are compared based on End- to-End Delay then token bucket based srTCM experiences less delay and TSW3CM among TSW group bears less delay. TSW3CM and srTCM gives better performance then other policers. If to choose among TSW3CM and srTCM then srTCM gives better performance and provide QoS requirements i.e. Less delay, less packet loss and more throughputs. srTCM is best to choose. REFERENCES [1] Blake, S. Black, D. Carlson, M. Davies, E. Wang, Z. and Weiss, WS. (2008) “An architecture for Differentiated Services”, RFC 2475. [2] Nichols, K. (1998) “Definition of Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers”, RFC 2474. [3] Brim, S. Carpenter, B. and Faucheur, F.le ( 2000) “Per Hop Behavior Codes”, RFC 2836 . [4] Heinanen, J. Baker, F. Weis, and W. Wroclawski, J. (1999) “Assured forwarding PHB Group”. [5] Fang, W. Seddigh, N. and Nandy, B. (2000) “Time Sliding Window Three Color Marker (TSW3CM)”, RFC 2859. [6] Heinanen, J. and Guerin, R. (2000) “A Single Rate Three Color Marker”, RFC 2697. [7] Stallings, W. (1999) “High Speed Networks: TCP/IP and ATM Design Principles”, Prentice Hall Englewood cliffs, NZ. Authors Pawansupreet Kaur was born in Ferozepur, Punjab, on July 23, 1989. Pawansupreet Kaur received her Bachelor of Technology and Engineering Degree from Adesh Institute of Engineering and Technology, Punjab, India. Currently she is doing Masters in Computer Science and Engineering from Shaheed Bhagat Singh State Technical Campus, Ferozepur, Punjab, India. Her Research Interest are in the areas of Networking and Mobile Telecommunication. Miss Pawansupreet Kaur is member of UACEE. Monika Sachdeva has done Btech in computer Science Engineering from National Institute of Technology (NIT), Jalandhar in 1997. She has done her MS software systems from BITS pilani in 2002. She has done her Phd in Computer Science and Engineering from Guru Nanak Dev University, Amritsar, Punjab, India in 2012. Gurjeet Kaur was born in Pehowa, Haryana, on December 1, 1986.Gurjeet Kaur received her Bachelor of Technology degree in Computer Science and Engineering from Adesh Institute Of Engineering & Technology, Punjab,India. Currently she is doing Master’s in Computer Science & Engineering from Shaheed Bhagat Singh State Technical campus, Ferozepur, Punjab, India. Her research interests are in the area of Telecommunication Networks (GSM Security), Location Based Services. Miss Gurjeet Kaur is member of UACEE and SDIWC.