QFabric is a networking technology designed for large-scale data centers that provides several defining characteristics including:
1) Any-to-any connectivity allowing full bandwidth sharing between interfaces without restrictions or blocking.
2) Low latency of 2-10 microseconds between interfaces that scales slowly with size and load.
3) No packet drops during congestion as traffic is throttled to match input and output rates smoothly.
4) Linear scaling of cost and power consumption as the number of interfaces increases in contrast to traditional approaches.
Integrated services and RSVP - ProtocolPradnya Saval
- MPLS can be used to create virtual private networks (VPNs) that provide wide-area connectivity between sites of a large organization through dedicated label switched paths. This gives the appearance of a dedicated network while transmitting through a public or shared MPLS network.
- The integrated services model was developed by IETF to provide different levels of quality of service in the Internet. It uses resource reservation, packet classification, and scheduling to ensure applications receive their requested QoS.
- The Resource Reservation Protocol (RSVP) is used by the integrated services model to signal resource requirements and set up flows with a requested QoS across a network. RSVP uses soft state and receiver-initiated reservations.
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issuesPARC, a Xerox company
This document discusses routing and transport issues for using Content-Centric Networking (CCN) in Vehicular Ad-Hoc Networks (VANETs). CCN is proposed as an attractive solution for VANETs due to its ability to handle dynamic topologies and provide location-based caching and delivery. However, challenges exist regarding integrating CCN with the IEEE 802.11p WAVE standard, efficient routing given vehicle mobility and intermittent connectivity, and providing reliable transport. The authors propose a Content-Centric Vehicular Networking (CCVN) architecture that uses counter-based forwarding to limit broadcast storms and provider tables for multi-hop content retrieval. Preliminary simulation results show CCVN can
The document discusses quality of service (QoS) in networks. It defines QoS as a tool to guarantee the best possible transport of data end-to-end. Key QoS parameters include delay, jitter, dropped packets, throughput, and availability. The document outlines several QoS architectures, including MPLS, IntServ, and DiffServ, examining their advantages and disadvantages for providing differentiated services.
The document discusses Quality of Service (QoS) techniques used to prioritize certain types of network traffic over others. It covers QoS concepts like classification, marking, queuing, and congestion avoidance. It also provides examples of how to implement QoS in Cisco devices and deploy QoS enterprise-wide.
This document provides an overview of quality of service (QoS) technologies for computer networks. It discusses two main QoS frameworks: Differentiated Services, which classifies traffic into groups and handles each group differently without resource reservation; and Integrated Services, which involves reserving resources for each session to guarantee performance levels. The document also compares the two frameworks and their approaches to service type, service scope, complexity, and scalability.
This document provides an overview of Network Functions Virtualization (NFV), including its technical requirements and challenges. NFV aims to improve network flexibility and reduce costs by using virtualization to separate network functions from dedicated hardware and deploy them as software on commercial off-the-shelf servers. While NFV may lower costs and speeds up service provisioning, challenges include ensuring virtual network functions meet performance requirements, efficiently managing their dynamic instantiation and migration, and addressing security and reliability issues.
Integrated services and RSVP - ProtocolPradnya Saval
- MPLS can be used to create virtual private networks (VPNs) that provide wide-area connectivity between sites of a large organization through dedicated label switched paths. This gives the appearance of a dedicated network while transmitting through a public or shared MPLS network.
- The integrated services model was developed by IETF to provide different levels of quality of service in the Internet. It uses resource reservation, packet classification, and scheduling to ensure applications receive their requested QoS.
- The Resource Reservation Protocol (RSVP) is used by the integrated services model to signal resource requirements and set up flows with a requested QoS across a network. RSVP uses soft state and receiver-initiated reservations.
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issuesPARC, a Xerox company
This document discusses routing and transport issues for using Content-Centric Networking (CCN) in Vehicular Ad-Hoc Networks (VANETs). CCN is proposed as an attractive solution for VANETs due to its ability to handle dynamic topologies and provide location-based caching and delivery. However, challenges exist regarding integrating CCN with the IEEE 802.11p WAVE standard, efficient routing given vehicle mobility and intermittent connectivity, and providing reliable transport. The authors propose a Content-Centric Vehicular Networking (CCVN) architecture that uses counter-based forwarding to limit broadcast storms and provider tables for multi-hop content retrieval. Preliminary simulation results show CCVN can
The document discusses quality of service (QoS) in networks. It defines QoS as a tool to guarantee the best possible transport of data end-to-end. Key QoS parameters include delay, jitter, dropped packets, throughput, and availability. The document outlines several QoS architectures, including MPLS, IntServ, and DiffServ, examining their advantages and disadvantages for providing differentiated services.
The document discusses Quality of Service (QoS) techniques used to prioritize certain types of network traffic over others. It covers QoS concepts like classification, marking, queuing, and congestion avoidance. It also provides examples of how to implement QoS in Cisco devices and deploy QoS enterprise-wide.
This document provides an overview of quality of service (QoS) technologies for computer networks. It discusses two main QoS frameworks: Differentiated Services, which classifies traffic into groups and handles each group differently without resource reservation; and Integrated Services, which involves reserving resources for each session to guarantee performance levels. The document also compares the two frameworks and their approaches to service type, service scope, complexity, and scalability.
This document provides an overview of Network Functions Virtualization (NFV), including its technical requirements and challenges. NFV aims to improve network flexibility and reduce costs by using virtualization to separate network functions from dedicated hardware and deploy them as software on commercial off-the-shelf servers. While NFV may lower costs and speeds up service provisioning, challenges include ensuring virtual network functions meet performance requirements, efficiently managing their dynamic instantiation and migration, and addressing security and reliability issues.
Quality of Service at the Internet Engineering Task ForceJohn Loughney
"Quality of Service at the Internet Engineering Task Force" Workshop on "End-to-End Quality of Service. What is it? How do we get it?" Geneva, 1-3 October 2003.
PLNOG 6: Emil Gągała - Introduction to BGP-MPLS. Ethernet VPN PROIDEA
This document provides an overview of BGP-MPLS Ethernet VPN (MAC VPN) as a technology for data center interconnect. It discusses the requirements for data center interconnect, limitations of existing approaches like VPLS, and how MAC VPN addresses these limitations. Specifically, MAC VPN supports active-active multi-homing, minimizes flooding by exchanging MAC address reachability between provider edge routers, and enables faster convergence during failures. The document outlines the key concepts of MAC VPN including MAC address learning, forwarding, and reference models.
This document provides an overview of Quality of Service (QoS) in computer networks. It discusses several key IP QoS mechanisms including resource reservation using RSVP, admission control with bandwidth brokers, packet classification and marking, queuing disciplines like priority queuing and weighted fair queuing, traffic shaping using leaky bucket and token bucket algorithms, and policing. It also describes QoS frameworks like IntServ and DiffServ that systematically apply these mechanisms. Finally, it covers QoS in wireless networks, focusing on support in 802.11 networks and interactions with mobility protocols.
This document discusses and compares layer-3 and layer-2 approaches to implementing IP/MPLS-based VPNs. MPLS layer-3 VPNs use a routed approach defined in RFC 2547, where customer routes are exchanged between provider edge (PE) routers using BGP. MPLS layer-2 VPNs can provide point-to-point or multi-point connectivity using virtual circuits or virtual private LAN service. The document evaluates aspects of each approach like supported traffic, scalability, and complexity to help service providers determine the best fit for their network.
Quality of Service (QoS) is an important concept in any network which ultimately leads to network efficiency and customer satisfaction. In this PPT, we deal mainly with the Quality of Service aspects relating to Femto Access Point (FAP) of UMTS technology. PPT mainly deals with the Guaranteed Bit Rate (GBR) implementations.
This document summarizes a research paper on simulating and analyzing an admission control mechanism for MPLS Differential Services-Traffic Engineering (DS-TE). It begins with an introduction to MPLS, QoS, and DS-TE. It then describes the proposed admission control mechanism, which uses Bandwidth Agents and multiple queues/tunnels to ensure adequate resources for different traffic classes. The mechanism is evaluated through NS-2 simulations of four scenarios, measuring metrics like throughput, delay, jitter and packet loss. The results show the mechanism improves performance for high-priority traffic by dedicating queues and bandwidth. In conclusion, the admission control mechanism helps preserve end-to-end QoS when transmitting DiffServ traffic over an MPL
This document discusses using fuzzy logic to help manage quality of service (QoS) in satellite communication systems. It outlines some challenges in maintaining service level agreements (SLAs) for QoS in satellite networks due to external factors like weather. The document proposes a fuzzy logic controller to help dynamically tune the parameters of the random early detection (RED) congestion control algorithm used in these networks. This approach aims to make satellite-IP networks more adaptive to changing weather conditions like rain fade that can impact performance.
Admission control for multihop wireless backhaul networks with qo sPfedya
This document proposes several schemes for admission control of connections with quality of service (QoS) requirements over a multihop wireless backhaul network. It first constructs tree topologies connecting wireless backhaul nodes to a wired gateway. It then admits either the best subset of connections while respecting their rate and delay requirements, or admits all connections with appropriate degradation of their QoS requirements. The key contributions are addressing both rate and delay requirements for connections, which has not been done before for wireless backhauls, and providing algorithms for admission control that deterministically guarantee delays.
The document discusses QoS models and implementation techniques. It describes IntServ and DiffServ models, with IntServ providing guaranteed service but limited scalability, and DiffServ providing "almost guaranteed" service while being more scalable. It also covers classification and marking tools, congestion avoidance/management tools, and techniques for traffic marking including using VLAN, IPv4 ToS, IPv6 traffic class, and DiffServ code points.
The blue active queue management algorithmsambitlick
This document proposes a new active queue management algorithm called BLUE. It summarizes that current techniques like RED rely on queue length as an indicator of congestion severity, but queue length provides little information about actual congestion levels. BLUE instead uses packet loss and link idle events to manage congestion. Simulation and experiments show BLUE significantly outperforms RED in reducing packet loss with smaller buffer requirements. The document also proposes a technique called Stochastic Fair BLUE to enforce fairness among large numbers of flows.
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
This document summarizes research on resource allocation algorithms for quality of service (QoS) optimization in mobile WiMAX networks. It discusses the Swapping Min-Max (SWIM) algorithm and Cooperative Multicast Scheduling (CMS) technique. SWIM performs scheduling for real-time polling service to meet QoS criteria like optimal throughput, latency guarantees, minimal delay jitter and number of bursts. CMS enhances throughput for multicast video by dividing transmission bursts into two phases where selected stations retransmit to nearby members for cooperation. Simulation results show SWIM has less bursts, zero jitter and optimal throughput, while CMS further improves throughput for each multicast group member.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Fast Distribution of Replicated Content to Multi- Homed ClientsIDES Editor
Clients can potentially have access to more than
one communication network nowadays due to the availability
of a wide variety of access technologies. On the other hand,
service replication has become a trivial approach in overlay
networks to provide a high availability of data and better QoS.
In this paper, we consider such a multi-homed client seeking
a replicated service in overlay network (e.g., CDN, peer-topeer).
Our aim is to improve the content distribution by
proposing a new model for being applied at the applicationlevel
and in a fully distributed way. Basically, our model
proposes to determine the best mirror server that could be
reached through each client’s network interface based on
application utility function. Then, it consists of downloading
the requested content from the determined best servers
simultaneously through their associated interfaces. Each best
server should deliver a specific estimated range of bytes (i.e.,
content chunk) to an independent TCP socket opened at the
client side for being finally aggregated at the applicationlevel.
Our real experiments show that our model is able to
considerably improve the QoS (e.g., content transfer time)
perceived by the client comparing to the traditional content
distribution techniques.
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...cscpconf
The document proposes a Dynamic Guard Channel Allocation with Channel Borrowing Strategy (DGCA-CBS) to efficiently utilize channels for handoffs in wireless networks. The scheme dynamically allocates guard channels for handoff requests based on traffic load over time. It also allows guard channels to be "borrowed" and assigned to new calls when unused, to maximize utilization. Simulation results show the proposed approach improves overall throughput by reducing both handoff and new call blocking rates compared to fixed and static guard channel allocation schemes.
The document discusses various techniques for congestion control in computer networks, including at both the router and host levels. It defines congestion control as efforts to prevent or respond to overload conditions in the network. At the router level, it describes queue management techniques like FIFO, priority queuing, fair queuing (FQ), and weighted fair queuing (WFQ) which aim to allocate bandwidth fairly between flows. It also discusses congestion notification methods including explicit feedback and implicit feedback via packet drops. At the host level, it mentions TCP congestion control and reservation-based approaches.
The document discusses quality of service (QoS) in multimedia communication networks, including QoS parameters and classes, deterministic and predictive QoS parameters, guaranteed and best effort QoS, QoS-aware service models, scheduling and policing mechanisms like priority scheduling and weighted fair queueing, and QoS architectures like Integrated Services and Differentiated Services.
Performance Analysis of Wireless Networks With MDQOSIJERA Editor
In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25 kbps for data transmission. From the designing point of view these requirements demands for an alternative resource planning, especially for bandwidth allocation in wireless networks. In wireless network where bandwidth is a scare resource, the system may need to block incoming user if all of the bandwidth has been used to provide highest quality of service to existing users. However this bandwidth resource planning may be unacceptable for larger application. A degradable approach to multiple users can be made on bandwidth allocation to reduce the blocking probability without degrading the quality of service to existing users.
This work aims towards a realization of a wireless/mobile network using W-CDMA multi access technique supporting multilevel quality of services. The bandwidth allocation to multiple users is adjusted dynamically according to the required network condition so as to increase bandwidth utilization. The work analyze the performance deriving the degradation period ratio, mean degradation time and degradation state for the implemented wireless network.The proposed work is aim to implement on Matlab tool for its functional verification considering various mobility patterns
Comparison of routing protocols with performance parameters for different num...ijctet
This document compares the performance of three reactive routing protocols (Bellman-Ford, DSR, and WRP) in mobile ad hoc networks under different numbers of nodes. It analyzes the protocols based on four performance metrics: end-to-end delay, packet delivery ratio, drop ratio, and normalized routing load. The document finds that Bellman-Ford and WRP have lower delay than DSR, DSR has a higher delivery ratio and lower drop ratio than the other protocols, and DSR and Bellman-Ford have lower routing overhead than WRP. Increasing the number of nodes generally causes delay and routing overhead to increase, and the packet delivery ratio to decrease.
Gemeenten gaan na de aankomende wijziging van de Drank- en Horecawet zelf het toezicht uitoefenen op de naleving van de Drank- en Horecawet. Het Vergunningen Informatie Systeem gaat de gemeenten daarbij ondersteunen met een speciale uitbreiding voor mobiele handhaving.
This document provides a summary of an individual's skills profile. It outlines over 13 years of experience in various roles including marketing, sales, operations management, business development, and entrepreneurship. Key skills include strategic planning, key account management, sales and marketing. Work experience spans multiple industries and includes roles managing business development, sales, projects, and as the owner/director of an IT consulting company. Educational background includes an MBA and B.Tech degrees.
Quality of Service at the Internet Engineering Task ForceJohn Loughney
"Quality of Service at the Internet Engineering Task Force" Workshop on "End-to-End Quality of Service. What is it? How do we get it?" Geneva, 1-3 October 2003.
PLNOG 6: Emil Gągała - Introduction to BGP-MPLS. Ethernet VPN PROIDEA
This document provides an overview of BGP-MPLS Ethernet VPN (MAC VPN) as a technology for data center interconnect. It discusses the requirements for data center interconnect, limitations of existing approaches like VPLS, and how MAC VPN addresses these limitations. Specifically, MAC VPN supports active-active multi-homing, minimizes flooding by exchanging MAC address reachability between provider edge routers, and enables faster convergence during failures. The document outlines the key concepts of MAC VPN including MAC address learning, forwarding, and reference models.
This document provides an overview of Quality of Service (QoS) in computer networks. It discusses several key IP QoS mechanisms including resource reservation using RSVP, admission control with bandwidth brokers, packet classification and marking, queuing disciplines like priority queuing and weighted fair queuing, traffic shaping using leaky bucket and token bucket algorithms, and policing. It also describes QoS frameworks like IntServ and DiffServ that systematically apply these mechanisms. Finally, it covers QoS in wireless networks, focusing on support in 802.11 networks and interactions with mobility protocols.
This document discusses and compares layer-3 and layer-2 approaches to implementing IP/MPLS-based VPNs. MPLS layer-3 VPNs use a routed approach defined in RFC 2547, where customer routes are exchanged between provider edge (PE) routers using BGP. MPLS layer-2 VPNs can provide point-to-point or multi-point connectivity using virtual circuits or virtual private LAN service. The document evaluates aspects of each approach like supported traffic, scalability, and complexity to help service providers determine the best fit for their network.
Quality of Service (QoS) is an important concept in any network which ultimately leads to network efficiency and customer satisfaction. In this PPT, we deal mainly with the Quality of Service aspects relating to Femto Access Point (FAP) of UMTS technology. PPT mainly deals with the Guaranteed Bit Rate (GBR) implementations.
This document summarizes a research paper on simulating and analyzing an admission control mechanism for MPLS Differential Services-Traffic Engineering (DS-TE). It begins with an introduction to MPLS, QoS, and DS-TE. It then describes the proposed admission control mechanism, which uses Bandwidth Agents and multiple queues/tunnels to ensure adequate resources for different traffic classes. The mechanism is evaluated through NS-2 simulations of four scenarios, measuring metrics like throughput, delay, jitter and packet loss. The results show the mechanism improves performance for high-priority traffic by dedicating queues and bandwidth. In conclusion, the admission control mechanism helps preserve end-to-end QoS when transmitting DiffServ traffic over an MPL
This document discusses using fuzzy logic to help manage quality of service (QoS) in satellite communication systems. It outlines some challenges in maintaining service level agreements (SLAs) for QoS in satellite networks due to external factors like weather. The document proposes a fuzzy logic controller to help dynamically tune the parameters of the random early detection (RED) congestion control algorithm used in these networks. This approach aims to make satellite-IP networks more adaptive to changing weather conditions like rain fade that can impact performance.
Admission control for multihop wireless backhaul networks with qo sPfedya
This document proposes several schemes for admission control of connections with quality of service (QoS) requirements over a multihop wireless backhaul network. It first constructs tree topologies connecting wireless backhaul nodes to a wired gateway. It then admits either the best subset of connections while respecting their rate and delay requirements, or admits all connections with appropriate degradation of their QoS requirements. The key contributions are addressing both rate and delay requirements for connections, which has not been done before for wireless backhauls, and providing algorithms for admission control that deterministically guarantee delays.
The document discusses QoS models and implementation techniques. It describes IntServ and DiffServ models, with IntServ providing guaranteed service but limited scalability, and DiffServ providing "almost guaranteed" service while being more scalable. It also covers classification and marking tools, congestion avoidance/management tools, and techniques for traffic marking including using VLAN, IPv4 ToS, IPv6 traffic class, and DiffServ code points.
The blue active queue management algorithmsambitlick
This document proposes a new active queue management algorithm called BLUE. It summarizes that current techniques like RED rely on queue length as an indicator of congestion severity, but queue length provides little information about actual congestion levels. BLUE instead uses packet loss and link idle events to manage congestion. Simulation and experiments show BLUE significantly outperforms RED in reducing packet loss with smaller buffer requirements. The document also proposes a technique called Stochastic Fair BLUE to enforce fairness among large numbers of flows.
RESOURCE ALLOCATION ALGORITHMS FOR QOS OPTIMIZATION IN MOBILE WIMAX NETWORKSijwmn
This document summarizes research on resource allocation algorithms for quality of service (QoS) optimization in mobile WiMAX networks. It discusses the Swapping Min-Max (SWIM) algorithm and Cooperative Multicast Scheduling (CMS) technique. SWIM performs scheduling for real-time polling service to meet QoS criteria like optimal throughput, latency guarantees, minimal delay jitter and number of bursts. CMS enhances throughput for multicast video by dividing transmission bursts into two phases where selected stations retransmit to nearby members for cooperation. Simulation results show SWIM has less bursts, zero jitter and optimal throughput, while CMS further improves throughput for each multicast group member.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Fast Distribution of Replicated Content to Multi- Homed ClientsIDES Editor
Clients can potentially have access to more than
one communication network nowadays due to the availability
of a wide variety of access technologies. On the other hand,
service replication has become a trivial approach in overlay
networks to provide a high availability of data and better QoS.
In this paper, we consider such a multi-homed client seeking
a replicated service in overlay network (e.g., CDN, peer-topeer).
Our aim is to improve the content distribution by
proposing a new model for being applied at the applicationlevel
and in a fully distributed way. Basically, our model
proposes to determine the best mirror server that could be
reached through each client’s network interface based on
application utility function. Then, it consists of downloading
the requested content from the determined best servers
simultaneously through their associated interfaces. Each best
server should deliver a specific estimated range of bytes (i.e.,
content chunk) to an independent TCP socket opened at the
client side for being finally aggregated at the applicationlevel.
Our real experiments show that our model is able to
considerably improve the QoS (e.g., content transfer time)
perceived by the client comparing to the traditional content
distribution techniques.
EFFICIENT UTILIZATION OF CHANNELS USING DYNAMIC GUARD CHANNEL ALLOCATION WITH...cscpconf
The document proposes a Dynamic Guard Channel Allocation with Channel Borrowing Strategy (DGCA-CBS) to efficiently utilize channels for handoffs in wireless networks. The scheme dynamically allocates guard channels for handoff requests based on traffic load over time. It also allows guard channels to be "borrowed" and assigned to new calls when unused, to maximize utilization. Simulation results show the proposed approach improves overall throughput by reducing both handoff and new call blocking rates compared to fixed and static guard channel allocation schemes.
The document discusses various techniques for congestion control in computer networks, including at both the router and host levels. It defines congestion control as efforts to prevent or respond to overload conditions in the network. At the router level, it describes queue management techniques like FIFO, priority queuing, fair queuing (FQ), and weighted fair queuing (WFQ) which aim to allocate bandwidth fairly between flows. It also discusses congestion notification methods including explicit feedback and implicit feedback via packet drops. At the host level, it mentions TCP congestion control and reservation-based approaches.
The document discusses quality of service (QoS) in multimedia communication networks, including QoS parameters and classes, deterministic and predictive QoS parameters, guaranteed and best effort QoS, QoS-aware service models, scheduling and policing mechanisms like priority scheduling and weighted fair queueing, and QoS architectures like Integrated Services and Differentiated Services.
Performance Analysis of Wireless Networks With MDQOSIJERA Editor
In Wireless/Mobile networks various kinds of encoding schemes were used for transmission of data over a bandwidth. The desired quality and generated traffic varies with the requirement with this bandwidth. A generic video telephony may require more than 40 kbps whereas a low motion video telephony may require about 25 kbps for data transmission. From the designing point of view these requirements demands for an alternative resource planning, especially for bandwidth allocation in wireless networks. In wireless network where bandwidth is a scare resource, the system may need to block incoming user if all of the bandwidth has been used to provide highest quality of service to existing users. However this bandwidth resource planning may be unacceptable for larger application. A degradable approach to multiple users can be made on bandwidth allocation to reduce the blocking probability without degrading the quality of service to existing users.
This work aims towards a realization of a wireless/mobile network using W-CDMA multi access technique supporting multilevel quality of services. The bandwidth allocation to multiple users is adjusted dynamically according to the required network condition so as to increase bandwidth utilization. The work analyze the performance deriving the degradation period ratio, mean degradation time and degradation state for the implemented wireless network.The proposed work is aim to implement on Matlab tool for its functional verification considering various mobility patterns
Comparison of routing protocols with performance parameters for different num...ijctet
This document compares the performance of three reactive routing protocols (Bellman-Ford, DSR, and WRP) in mobile ad hoc networks under different numbers of nodes. It analyzes the protocols based on four performance metrics: end-to-end delay, packet delivery ratio, drop ratio, and normalized routing load. The document finds that Bellman-Ford and WRP have lower delay than DSR, DSR has a higher delivery ratio and lower drop ratio than the other protocols, and DSR and Bellman-Ford have lower routing overhead than WRP. Increasing the number of nodes generally causes delay and routing overhead to increase, and the packet delivery ratio to decrease.
Gemeenten gaan na de aankomende wijziging van de Drank- en Horecawet zelf het toezicht uitoefenen op de naleving van de Drank- en Horecawet. Het Vergunningen Informatie Systeem gaat de gemeenten daarbij ondersteunen met een speciale uitbreiding voor mobiele handhaving.
This document provides a summary of an individual's skills profile. It outlines over 13 years of experience in various roles including marketing, sales, operations management, business development, and entrepreneurship. Key skills include strategic planning, key account management, sales and marketing. Work experience spans multiple industries and includes roles managing business development, sales, projects, and as the owner/director of an IT consulting company. Educational background includes an MBA and B.Tech degrees.
The Juniper Networks QFX3008 QFabric Interconnect acts as the backplane of the QFabric architecture, connecting QFX3500 edge devices in a full mesh topology. It provides high-speed transport between nodes with 10.24 Tbps of switching capacity and supports up to 6,000 ports. Each interconnect chassis has dual controllers, eight fabric modules, and redundant power supplies to ensure high availability. The interconnect enables the QFabric architecture to deliver any-to-any connectivity while lowering costs.
Informatiebijeenkomst Bijzondere Wetten 19 april 2011 (Frank Joosten)Rob van de Plassche
Presentatie Frank Joosten op de Informatiebijeenkomst Bijzondere Wetten op 19 april 2011 te Utrecht, georganiseerd door Berkeley Bridge ( www.bijzonderewetten.nl ).
The Juniper Networks QFX3500 Switch is a 1U, high-performance switch with 48 SFP+ ports and 4 QSFP+ ports. It delivers Layer 2 and Layer 3 connectivity for demanding data center environments. It can operate as an FCoE Transit Switch, connecting FCoE servers to a Fibre Channel storage area network, or as an FCoE-FC Gateway to integrate existing Fibre Channel networks without disruption. The QFX3500 provides wire-speed switching with low latency suitable for applications such as high-performance computing and cloud environments.
The document discusses unconventional ways to challenge human players against CPUs through systems-based challenges, getting physical challenges, and human-driven challenges. It describes developing games that use new interfaces like Leap Motion, large touchscreens, and virtual reality to test skills that were previously not possible in games. The document advocates for designing games focused on human interfaces that have simple mechanics, surprise, humor, and appeal to audiences.
This white paper discusses the most common VPN technologies and highlights hidden costs, which should
be considered when deploying a VPN. Network meshing and the addition of subsequent nodes are automatic functions of “connection-less” technology, including MPLS and IPSec. However, Frame Relay, a “connection oriented” technology, requires separate “permanent” virtual circuits to be
manually programmed, in order for each node to be meshed.
The Juniper Networks QFX3000 QFabric Switch is designed for modern data centers and delivers a scalable, high-performance fabric. It consists of edge devices called Nodes, interconnect devices, and control devices called Directors. Together these create a single logical switch that can support thousands of server ports. It provides a single point of management and simplifies provisioning and troubleshooting of the data center network.
Practical active network services within content-aware gatewaysTal Lavian Ph.D.
The Internet has seen an increase in complexity due to the introduction of new types of networking devices and services, particularly at points of discontinuity known as network edges. As the networking industry continues to add revenue generating services at network edges, there is an increasing need to provide a systematic method for dynamically introducing and providing these new services in lieu of the ad-hoc approach that is in use today. To this end we support a phased approach to "activating" the Internet and suggest that there exists an immediate need for realizing Active Networks concepts at the network edges. In this context, we present our efforts towards the development of a Content-aware Active Gateway (CAG) architecture. With the help of two practical services running on our initial prototype, built from commercial networking devices, we give a qualitative and quantitative view of the CAG potential.
QFabric flattens and simplifies the network by allowing multiple devices to act as one. It provides the scale and resiliency of a network and the performance and simplicity of a single switch. Learn more at http://www.juniper.net/us/en/dm/datacenter/
Project DRAC: Creating an applications-aware networkTal Lavian Ph.D.
Intelligent networking and the ability for applications to more effectively use all of the network’s capability, rather than just the transport “pipe,” have been elusive. Until now. Nortel has developed a proof-of-concept software capability — service-mediation “middleware” called the Dynamic Resource Allocation Controller (DRAC) — that runs on any Java platform and opens up the network to applications with proper credentials,making available all of the properties of a converged network, including service topology, time-of-day reservations, and interdomain connectivity options. With a more open network, applications can directly provision and invoke services, with no need for operator involvement or point-and click sessions. In its first real-world demonstrations in large research networks, DRAC is showing it can improve user satisfaction while reducing network operations and investment costs.
Why all clouds are not created equal enterprise cloud, public cloud, carrier cloud strategic white paper. Cloud computing technology brings an unprecedented level of independence and liberation in deploying applications. Applications are no longer tied to dedicated hardware, yet clouds vary significantly in their capabilities and their cost. This paper helps readers understand the differences between enterprise clouds and public clouds, and explains the advances available in carrier clouds.
The document discusses how future networking is being impacted by cloud/hybrid IT, software-defined networking, and network functions virtualization. Specifically:
1) The emergence of public cloud and hybrid IT models is driving more traffic to data centers and changing expectations around network flexibility and costs.
2) Software-defined WAN (SD-WAN) solutions allow businesses more control over their networks by using overlays to connect sites over multiple networks like broadband internet and MPLS.
3) Network functions virtualization (NFV) enables network functions to be deployed as software, increasing flexibility and reducing costs compared to hardware appliances.
This document discusses cloud computing concepts including origins, definitions, characteristics, deployment models, service models, virtualization benefits, and economic principles. Specifically:
- Cloud computing originated from telecommunications networks and focuses on abstracting internal components while defining overall architecture and interfaces.
- Key characteristics include on-demand access to pooled resources over the network, rapid elasticity, and metered usage-based billing.
- Virtualization provides abstraction between hardware and software for location-independent and flexible resource allocation.
- Economic principles demonstrate how cloud computing can reduce costs compared to traditional fixed infrastructure models through pay-per-use pricing and scaling to fluctuating demand.
Virtual routing platforms allow carriers to take advantage of virtualization benefits while supporting SDN and NFV initiatives. They aim to provide carrier-grade routing functions with performance comparable to physical routers, using the same management systems and consistent behaviors. Virtual platforms are well-suited for new applications where physical routers cannot meet needs, and allow flexible, on-demand scaling and lower costs than physical routers. Both physical and virtual platforms have strengths and can form blended networks, with services placed based on requirements. Virtual platforms open new approaches to network design and service delivery.
SDN and NFV Value in Business Services: Innovations in Network Monetization a...Cisco Service Provider
White paper submitted to the Society of Cable Telecommunications Engineers (SCTE) by Mazen Khaddem of Cox Communications and Dr. Loukas Paraschis of Cisco Systems. Paper covers technical reference design in SDN including the role of open source, orchestration and control, and the importance of a hybrid control plane for legacy, multivendor networks.
Dual-resource TCPAQM for Processing-constrained Networksambitlick
This document summarizes a research paper that examines congestion control issues for TCP flows that require in-network processing by network elements like routers. It proposes a new active queue management (AQM) scheme called Dual-Resource Queue (DRQ) that can approximate proportional fairness for bandwidth and CPU resources without changing TCP stacks. The study finds that current TCP/AQM schemes can lose throughput and cause unfairness in networks where CPU cycles are scarce. DRQ maintains separate queues for each resource and works with classes of flows based on their known processing requirements, making it scalable without per-flow state. Simulation results show DRQ achieves fair and efficient resource allocation with low implementation costs.
Reprinted with permission of NCTA, from the 2014 Cable Connection Spring Technical Forum Conference Proceedings. For more information on Cisco cloud solutions, visit: http://www.cisco.com/c/en/us/products/cloud-systems-management/index.html
Admission control and routing in multi hop wireless networksambitlick
This document summarizes a research paper about admission control and routing algorithms for multi-hop wireless networks that provide quality of service guarantees for flows requesting a pre-specified bandwidth. The paper develops an optimal admission control and routing algorithm that has performance close to an offline algorithm with complete future knowledge. The algorithm makes no assumptions about flow arrival patterns and can be implemented in a distributed manner. It also proves this algorithm is asymptotically optimal with respect to competitive ratio, a metric that measures performance compared to an offline algorithm. Finally, the paper discusses how the algorithm can be modified to allow use of standard shortest-path algorithms for distributed implementation.
This document summarizes a research paper about admission control and routing algorithms for multi-hop wireless networks that provide quality of service guarantees for flows requesting a pre-specified bandwidth. The paper develops an optimal admission control and routing algorithm that has performance close to an offline algorithm with complete future knowledge. The algorithm makes no assumptions about flow arrival patterns and can be implemented in a distributed manner. It also proves this algorithm is asymptotically optimal with respect to competitive ratio, a metric that measures performance compared to an offline algorithm. Finally, the paper discusses how the algorithm can be modified to use standard shortest-path algorithms for distributed implementation.
Dear Students
Ingenious techno Solution offers an expertise guidance on you Fianal Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us : http://mailto:enquiry@ingenioustech.in 044-42046028 or 8428302179.
we are located in the following venue:
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
Dear Students
Ingenious techno Solution offers an expertise guidance on you Fianal Year IEEE & Non- IEEE Projects on the following domain
JAVA
.NET
EMBEDDED SYSTEMS
ROBOTICS
MECHANICAL
MATLAB etc
For further details contact us : http://mailto:enquiry@ingenioustech.in 044-42046028 or 8428302179.
we are located in the following venue:
Ingenious Techno Solution
#241/85, 4th floor
Rangarajapuram main road,
Kodambakkam (Power House)
http://www.ingenioustech.in/
This document discusses service meshes and provides examples of popular service meshes like Linkerd and Istio. It defines a service mesh as a dedicated infrastructure layer that handles service-to-service communication and provides traffic management, observability, and policy enforcement. Benefits of a service mesh include discovery, load balancing, failure recovery, metrics, monitoring, and access control. Popular service meshes like Linkerd and Istio are then described in more detail.
This paper focuses on the evolutionary stages for cloudification then covers the key software building blocks that will be needed to enable NFV, and ultimately ICT transformation to 5G. It describes how Intel® Open Networking Platform (Intel® ONP) Server running on innovative new networking platforms based on Intel® silicon can help reduce the cost and effort required for service providers and vendors alike to adopt and deploy SDN and NFV architectures.
By deploying fiber deeper into the access network, service providers can swiftly deliver more capacity and successfully compete in an increasingly competitive marketplace. Deploying 50 Mbps or more bandwidth to consumers allows cable operators and telecommunications carriers the ability to capture a leadership position by offering the promise of exciting new services that can’t possibly be met by networks designed to deliver first-generation broadband services. Deep fiber enables success-based deployments and allows service providers to drive down OPEX costs by reducing the number of active equipment elements in the access network.
Similar to Defining characteristics of qfabric (20)
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Defining characteristics of qfabric
1. February 2011
DEFININg CHARACTERISTICS OF QFABRIC
By Pradeep Sindhu
The purpose of this note is to introduce a set of defining characteristics
that set QFabric apart from other technologies that have been used or
proposed for building the internal networks of large scale data centers. It
is important to state that these characteristics complement each other
and work synergistically to help QFabric deliver its benefits. Thus we will
insist that for any technology to be labeled “QFabric” it must have all of the
defining characteristics and not just some of them.
The note begins with a set of definitions and a description of the general
benefits of QFabric. It then lists the defining characteristics and says why
they are important to building efficient, cost effective, dynamic, and easy
to manage data centers.
2. Definitions and General Benefits
QFabric is the name of a packet-switched networking technology
Defining Characteristics
purpose-built to enable the construction of highly efficient, cost A QFabric has the fundamental property of scalability which is
effective, dynamic, and easy to manage data centers over a wide defined as the ability to maintain a set of defining characteristics
range of scales using standard off-the-shelf computing, storage, as the implementation grows in size from small values of N to
and services elements. The elements connect to QFabric via open large values of N. These defining characteristics are:
standard network interfaces such as Ethernet and Fiber Channel. 1. Any-to-any connectivity with fairness and full non-blocking:
QFabric will enable the performance of data centers to be improved This is the ability of a set of interfaces to send and receive
at a much faster rate than is possible by relying on performance packets to and from any other set with no restrictions or pre-
improvements of the infrastructure elements alone (e.g., Moore’s Law planning. Specifically, this includes the ability to absorb rapid
for microprocessors). We call this enhanced ability of QFabric to improve changes to the rate of transmission, the number of active
the performance of data centers over time “exponential scaling”. senders, and the number of active receivers. In all cases the
Overall, QFabric embodies two quintessential capabilities: full bandwidth of a target interface(s) is shared equally by
all contending interfaces instantaneously and continuously,
• The ability to treat data center computing, storage, services, and including in the special case of one interface sending to
network resources as fully fungible pools that can be dynamically just one other interface; this equal sharing is referred to as
and rapidly partitioned without the infrastructure or the applications “fairness”. Finally, the only apparent congestion is due to
knowing details about each other1. This is the key to simplicity, the limited bandwidth of ingress and egress interfaces and
efficiency, and security in the data center. any congestion of egress interfaces does not affect ingress
• The ability to connect the resources to each other at very high interfaces sending to non-congested interfaces; this non-
speeds with apparently no limitations in the interconnect except interference is referred to as “non-blocking”.
fixed interface bandwidth and a small transit latency. This is the key 2. Low latency and jitter: QFabric has interface-to-interface
to high performance as well as further efficiency improvements. latency on the order of 2 microseconds at small scale growing
A QFabric is represented as a circular object with N identical slowly to about 10 microseconds at the largest scale. The
interfaces to which server, storage, services, or network devices can latency also grows slowly with offered traffic load. QFabric also
attach themselves. The circular symbol is chosen to suggest the provides very low jitter.
property that all interfaces of QFabric are equidistant to each other in
3. No packet drops under congestion: When the instantaneous
terms of latency and equivalent in terms of bandwidth they can sink or
rate of packets coming in exceeds the instantaneous rate
source. This means that the internal network of QFabric appears to its
at which they are going out, QFabric signals the source
users to be flat, not hierarchical. The number of interfaces N is called
(e.g. servers or VMs) causing congestion to slow down by
the scale of the QFabric.
the appropriate amount so that the arrival rate matches
the departure rate. This throttling happens rapidly and
continuously to match input rate to output rate in a smooth •
Industry Standard Interfaces manner.
and Protocols
4. Linear cost and power scaling: The cost and power
consumption of QFabric increases linearly with the number of
interfaces N. This is in sharp contrast to traditional approaches
where both cost and power increase much faster than linearly.
5. Support of virtual networks and services: QFabric implements
virtual Layer 2 and Layer 3 networks to support multiple
tenants each running multi-tier applications. Complex security
and services requirements are supported by the insertion of
Layer 4-7 processing at any point in an application’s workflow.
Full mobility of virtual machines from any interface to any
Figure 1: A QFabric with 16 Interfaces
other interface is supported. Support of virtual networks does
not compromise any of the other properties.
Comparison to the Ideal Fabric 6. Modular distributed implementation that is highly reliable
and scalable: QFabric is built using a set of modular
We define the Ideal Fabric as one that has fixed interface bandwidth,
hardware and software components that are distributed and
but infinite internal bandwidth and zero interface-to-interface latency.
federated to provide high levels of redundancy. The modular
As we will see from the following defining characteristics, QFabric
implementation is designed to permit increasing or decreasing
comes very close to the Ideal Fabric. In other words, QFabric is about as
the number of interfaces while the system is running, a property
well as one can do given the constraints of physical implementation.
we call “dynamic scalability”.
7. Single logical device: Despite its distributed implementation,
QFabric acts as a single logical packet switching device—the
complexity of its distributed implementation is hidden without
removing any of the desirable properties such as high reliability
or dynamic scalability.
1
In a multi-tenant data center it is completely impractical to assume that the infrastructure knows
about the details of any application or that applications know about details of the infrastructure.
3. Why these characteristics are important
These defining characteristics represent a quantum jump in the networking technology used to build data centers.
They are the principal way in which we will provide exponential scaling for data centers for the next decade.
Importance of Scalability Importance of No Drop under Congestion
Scalability is the fundamental characteristic of QFabric. It is The ability to not drop packets when congestion occurs is critical
important for two reasons: to efficiently transporting “bursty” server to disk traffic. Most
applications assume that reads and writes to disk will succeed
• Economics: Scale is a pre-requisite for achieving better
with very high probability. Packet drops due to congestion breaks
economics in data centers. Small scale data centers simply
this assumption and forces the application to handle packet loss
cannot be made as efficient as large scale ones because of the
as an error, resulting in a drastic reduction in performance given
pooling principle, which states that when P equal size partitions
the relative frequency of congestion events. As noted earlier, in
of a resource are combined into a single pool, we need fewer
QFabric the no drop property is provided by not harming “innocent
units of the resource to provide the same level of service. Of
bystanders” interfaces whose traffic is not destined to congested
course, to reap the benefits of pooling we need to be able to
interfaces. This latter property of the implementation is key to
make the resources fully fungible.
supporting multi-tenancy and multiple applications within a tenant.
• Performance: For most applications the raw performance of a
set of tightly coupled computing elements in a single large data Importance of Linear Cost and Power Scaling
center is significantly better than the collective performance Since each interface requires some forwarding hardware, it is easy
of these same elements distributed over a number of smaller to see that the cost and power of a fabric must increase at least
data centers. This performance difference has to do with the linearly with the number of interfaces N. QFabric is able to achieve
inherently lower latency and higher bandwidth of inter-processor the ideal of linear scaling, which is highly desirable from both a
communication in a single data center. CAPEX and an OPEX standpoint.
Importance of Any-to-Any Fair, Non-Blocking Importance of Support for Virtual Networks and Services
Connectivity Support for Virtual Networks is important because data centers
This type of connectivity is critical to pooling the computing and are increasingly multi-tenant and have complex requirements for
storage resources in a data center. Without these capabilities application security, performance, and reliability. Virtual networks
resources in a large data center would remain stranded and not provide the basic tools to allow resources to be partitioned and
efficiently usable. This “flat” connectivity also goes a long way yet allow them to communicate securely when necessary. These
towards simplifying the writing of applications since there is no abstractions are essential to decoupling the applications from the
need to worry about the performance hierarchy of communication infrastructure.
paths inside the data center. It also relieves the operations staff
Importance of a Distributed, Modular Implementation
from having to worry about the “affinity” of application components
in order to provide good performance. A modular implementation where the modules are kept
independent through the use of physical or logical separation
Importance of Low Latency has two important benefits. The first is that failures in either the
Low latency in QFabric is critical to high performance, especially hardware or software are unable to compromise the entire system.
for modern applications where the ratio of communication to The second is that it becomes possible to increase or decrease the
computation is relatively high compared to legacy applications. For size of the system while it is running.
example financial applications are especially sensitive to latency.
Importance of Acting as a Single Logical Device
High latency translates directly to lower performance because
applications stall when they are waiting for a response over the This characteristic is important because it provides the simplest
interconnect—the more frequent and longer the stall, the lower the possible model for the network from a data center administrator’s
performance. standpoint. It permits orchestration and management applications
to be as simple as possible.
4. Conclusion
QFabric is a revolutionary new network technology purpose-built to allow the construction
of large scale data centers using off-the-shelf computing and storage elements connected
using industry standard network interfaces. It allows the performance of data centers to
be “scaled exponentially”, or improved at a rate much faster than is possible by relying on
improvements of the computing and storage elements alone. This exponential scaling
property is fundamental to making data centers not only much more powerful but also more
economically efficient, dynamic, and easier to manage.
At the highest level, QFabric embodies two quintessential capabilities. The first is its ability to
treat data center computing, storage, services, and network resources as fully fungible pools
that can be dynamically and rapidly partitioned without the infrastructure or the applications
knowing details about each other; this is the key to simplicity, efficiency, and security in data
centers. The second is the ability to connect the resources to each other at very high speeds
and with very low latency while ensuring fairness; this is the key to high performance and
further efficiency improvements.
This paper has laid out seven defining characteristics of QFabric that set it apart from all
other networking technologies currently in use or proposed for the data center. These defining
characteristics are orthogonal to each other and encompass performance, cost, power,
virtualization, security, reliability, and modularity dimensions that work together to provide the
two quintessential capabilities mentioned above.
QFabric represent a quantum jump in the networking technology used to build data centers
and will be the key to exponentially scaling high performance computing and storage over the
next decade.
Biography
Pradeep Sindhu
Vice Chairman, Chief Technical Officer and Founder
Pradeep Sindhu founded Juniper Networks in February 1996, and
is now the company’s Vice Chairman and CTO. His founding vision
was and still is to Connect Everything and Empower Everyone.
Before founding Juniper Networks, Dr. Sindhu was a Principal
Scientist and Distinguished Engineer at the Computer Science
Lab at Xerox’s Palo Alto Research Center (PARC).
He holds a bachelor’s degree in electrical engineering from the Indian Institute of Technology
in Kanpur, as well as a master’s degree in the same discipline from the University of Hawaii. In
addition, Dr. Sindhu holds both a master’s and a doctorate degree in computer science from
Carnegie Mellon University.
Corporate and Sales Headquarters APAC Headquarters EMEA Headquarters
Juniper Networks, Inc. Juniper Networks (Hong Kong) Juniper Networks Ireland
1194 North Mathilda Avenue 26/F, Cityplaza One Airside Business Park
Sunnyvale, CA 94089 USA 1111 King’s Road Swords, County Dublin, Ireland
Phone: 888.JUNIPER (888.586.4737) Taikoo Shing, Hong Kong Phone: 35.31.8903.600
or 408.745.2000 Phone: 852.2332.3636 EMEA Sales: 00800.4586.4737
Fax: 408.745.2100 Fax: 852.2574.7803 Fax: 35.31.8903.601
www.juniper.net
Copyright 2011 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos,
NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other
countries. All other trademarks, service marks, registered marks, or registered service marks are the property of
their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper
Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
2000384-001-EN Feb 2011 Printed on recycled paper