This ppt describes about the Different protocols of Ad-Hoc Network .It is a pure survey report which will make clarification about each protocols used in ad-hoc network and helps to future generation to make more publishing of recent trends of ad-hoc networks.
What is Quality of Service?
-Basic mechanisms
-Leaky and token buckets
-Integrated Services (IntServ)
-Differentiated Services (DiffServ)
-Economics and Social factors facing QoS
-QoS Vs. Over Provisioning
This ppt describes about the Different protocols of Ad-Hoc Network .It is a pure survey report which will make clarification about each protocols used in ad-hoc network and helps to future generation to make more publishing of recent trends of ad-hoc networks.
What is Quality of Service?
-Basic mechanisms
-Leaky and token buckets
-Integrated Services (IntServ)
-Differentiated Services (DiffServ)
-Economics and Social factors facing QoS
-QoS Vs. Over Provisioning
Communication over the kinds of Data-Links used for unmanned vehicles presents important challenges dues to the low bandwidth, intermittent, and lower reliability of these links. Classic network protocols such as TCP do not operate well in this environment forcing application developers to implement their own reliability and session management. This presentation describes he issues and alternatives.
Four issues must be addressed to ensure quality of service:
Application Requirements.
Traffic shaping.
Packet scheduling.
Admission control.
Versions of quality of service for the Internet:
Integrated Services.
Differentiated Services.
A fundamental problem before carriers today is to optimize network cost
and performance by better resource allocation to traffic demands. This is especially
important with the packet infrastructure becoming a critical business resource.
The key to achieving this is traffic engineering (TE), the process of
systematically putting traffic where there is capacity, and backbone
capacity management, the process of ensuring that there is enough network
capacity to meet demand, even at peak times and under failure conditions,
without significant queue buildups.
In this talk, we first focus on the TE techniques and approaches used
in the networks of two large carriers: Global Crossing and
Sprint, which represent the two ends of the traffic engineering spectrum.
We do so by presenting a snapshot of their TE philosophy, deployment strategy,
and network design principles and operation.
We then present the results of an empirical study of backbone traffic
characteristics that suggests that Internet traffic is not self-similar at
timescales relevant to QoS. Our non-parametric approach requires minimal
assumptions (unlike much of the previous work), and allows
us to formulate a practical process for ensuring QoS using backbone
capacity management.
(This latter work is joint with Thomas Telkamp, Global Crossing Ltd. and Arman
Maghbouleh, Cariden Technologies, Inc.)
Pre-Con Education: Recognizing Your Network's Key Performance Indicators Th...CA Technologies
Understanding key network metrics that impact end-user experience and how to leverage these key performance indicators is imperative for troubleshooting issues and restoring optimal network performance.
In this presentation, you will learn how to establish fundamental metrics for technology communications, gain an understanding of key concepts attributed to communication processes, gain an understanding of network performance metrics that actually impact end users, understand five sources of network latency and learn to use reference models as a troubleshooting tool.
For more information on DevOps solutions from CA Technologies, please visit: http://bit.ly/1wbjjqX
MODULE III Parallel Processors and Memory Organization 15 Hours
Parallel Processors: Introduction to parallel processors, Concurrent access to memory and cache
coherency. Introduction to multicore architecture. Memory system design: semiconductor memory
technologies, memory organization. Memory interleaving, concept of hierarchical memory
organization, cache memory, cache size vs. block size, mapping functions, replacement
algorithms, write policies.
Case Study: Instruction sets of some common CPUs - Design of a simple hypothetical CPU- A
sequential Y86-64 design-Sun Ultra SPARC II pipeline structure
MODULE II Control unit, I/O systems and Pipelining 15 Hours
CPU control unit design: Hardwired and micro-programmed design approaches, Peripheral
devices and their characteristics: Input-output subsystems, I/O device interface, I/O transfersprogram controlled, interrupt driven and DMA, privileged and non-privileged instructions, software
interrupts and exceptions. Programs and processes-role of interrupts in process state transitions,
I/O device interfaces - SCII, USB. Basic concepts of pipelining, throughput and speedup, pipeline
hazards.
Functional Blocks of a Computer: Functional blocks and its operations. Instruction set architecture of a CPU - registers, instruction execution cycle, Data path, RTL interpretation of
instructions, instruction set. Performance metrics. Addressing modes. Data Representation:
Signed number representation, fixed and floating point representations, character representation.
Computer arithmetic - integer addition and subtraction, ripple carry adder, carry look-ahead
adder, etc. multiplication - shift-and add, Booth multiplier, carry save multiplier, etc. Division
restoring and non-restoring techniques, floating point arithmetic.
Module II - Distributed objects and file systems:
Introduction - Communication between distributed objects - Remote procedure call - Events and notifications - case study - Operating system support - introduction - operating system layer - protection - process and threads - communication and invocation - architecture - Introduction to DFS - File service architecture - Sun network file system - Andrew file system - Enhancements and future developments.
Module 2 - Distributed Objects and File Systems
Introduction - Communication between distributed objects - Remote procedure call - Events and notifications - case study - Operating system support - introduction - operating system layer - protection - process and threads - communication and invocation - architecture - Introduction to DFS - File service architecture - Sun network file system - Andrew file system - Enhancements and future developments.
Module I
Introduction to Distributed systems - Examples of distributed systems, resource sharing and the web, challenges - System model - introduction - architectural models - fundamental models - Introduction to inter-process communications - API for Internet protocol - external data.
Module I
Introduction to Distributed systems - Examples of distributed systems, resource sharing and the web, challenges - System model - introduction - architectural models - fundamental models - Introduction to inter-process communications - API for Internet protocol - external data.
Module 6: IP and System Security
IP security overview-IP security policy-Encapsulating Security payload-intruders-intrusion detectionvirus/worms-countermeasure-need for firewalls-firewall characteristics-types of fire
Module 4: Key Management and User Authentication
X.509 certificates- Public Key infrastructure-remote user authentication principles-remote user
authentication using symmetric and asymmetric encryption-Kerberos V5
Module 1: Introduction to Cryptography and Symmetric Key Ciphers
Computer Security Concepts - OSI Security Architecture -Security Attacks - Services, Mechanisms -
Symmetric Cipher Model - Traditional Block Cipher Structure - The Data Encryption Standard -The Strength of DES - Advanced Encryption Standard.
Module 6
Advanced Networking
Security problems with internet architecture, Introduction to Software defined networking, Working of SDN, SDN in data centre, SDN applications, Data centre networking, IoT.
Module 6: Standards for Information Security Management
Information Security Management Systems (ISMS) - ISO 27001 - Framing Security Policy of
Organization- Committees- Security Forum, Core Committee, Custodian and Users, Business
Continuity Process Team & Procedure- Information Security Auditing Process. IT Security Incidents
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
2. UNIT - IV
Integrated services architecture
Approach, components and services
Queuing discipline: FQ, PS, BRFQ, WFQ
Random early detection
Differentiated services
3. Introduction
New additions to Internet increasing traffic
High volume client/server application
Web
Graphics
Real time voice and video
Need to manage traffic and control congestion
IEFT standards
Integrated services
Collective service to set of traffic demands in domain
Limit demand & reserve resources
Differentiated services
Classify traffic in groups
Different group traffic handled differently
3
4. Integrated Services Architecture (ISA)
IPv4 header fields for precedence and type of service
usually ignored
ATM only network designed to support TCP, UDP and
real-time traffic
May need new installation
Need to support Quality of Service (QoS) within TCP/IP
Add functionality to routers
Means of requesting QoS
4
5. Internet Traffic – Elastic
Can adjust to changes in delay and throughput
E.g. common TCP and UDP application
E-Mail – insensitive to delay changes
FTP – User expect delay proportional to file size
Sensitive to changes in throughput
SNMP – delay not a problem, except when caused by congestion
Web (HTTP), TELNET – sensitive to delay
Not per packet delay – total elapsed time
E.g. web page loading time
For small items, delay across internet dominates
For large items it is throughput over connection
Need some QoS control to match to demand
5
6. Internet Traffic – Inelastic
Does not easily adapt to changes in delay and throughput
Real time traffic
Throughput
Minimum may be required
Delay
E.g. stock trading
Jitter - Delay variation
More jitter requires a bigger buffer
E.g. teleconferencing requires reasonable upper bound
Packet loss
6
7. Inelastic Traffic Problems
Difficult to meet requirements on network with
variable queuing delays and congestion
Need preferential treatment
Applications need to state requirements
Ahead of time (preferably) or on the fly
Using fields in IP header
Resource reservation protocol
Must still support elastic traffic
Deny service requests that leave too few resources
to handle elastic traffic demands
7
8. ISA Approach
Provision of QoS over IP
Sharing available capacity when congested
Router mechanisms
Routing Algorithms
Select to minimize delay
Packet discard
Causes TCP sender to back off and reduce load
Enahnced by ISA
8
9. Flow
IP packet can be associated with a flow
Distinguishable stream of related IP packets
From single user activity
Requiring same QoS
E.g. one transport connection or one video stream
Unidirectional
Can be more than one recipient
Multicast
Membership of flow identified by source and destination IP
address, port numbers, protocol type
IPv6 header flow identifier can be used but isnot
necessarily equivalent to ISA flow
9
10. ISA Functions
Admission control
For QoS, reservation required for new flow
RSVP used
Routing algorithm
Base decision on QoS parameters
Queuing discipline
Take account of different flow requirements
Discard policy
Manage congestion
Meet QoS
10
12. ISA Components – Background Functions
Reservation Protocol
RSVP
Admission control
Management agent
Can use agent to modify traffic control database and
direct admission control
Routing protocol
12
13. ISA Components – Forwarding
Classifier and route selection
Incoming packets mapped to classes
Single flow or set of flows with same QoS
E.g. all video flows
Based on IP header fields
Determines next hop
Packet scheduler
Manages one or more queues for each output
Order queued packets sent
Based on class, traffic control database, current
and past activity on outgoing port
Policing
13
14. ISA Services
Traffic specification (TSpec) defined as service for flow
On two levels
General categories of service
Guaranteed
Controlled load
Best effort (default)
Particular flow within category
TSpec is part of contract
14
15. Token Bucket
Many traffic sources can be defined by token
bucket scheme
Provides concise description of load imposed by
flow
Easy to determine resource requirements
Provides input parameters to policing function
15
17. ISA Services - Guaranteed Service
Assured capacity level or data rate
Specific upper bound on queuing delay through
network
Must be added to propagation delay or latency to
get total delay
Set high to accommodate rare long queue delays
No queuing losses
I.e. no buffer overflow
E.g. Real time play back of incoming signal can use
delay buffer for incoming signal but will not tolerate
packet loss
17
18. ISA Services - Controlled Load
Tightly approximates to best efforts under unloaded conditions
No upper bound on queuing delay
High percentage of packets do not experience delay over
minimum transit delay
Propagation plus router processing with no queuing
delay
Very high percentage delivered
Almost no queuing loss
Adaptive real time applications
Receiver measures jitter and sets playback point
Video can drop a frame or delay output slightly
Voice can adjust silence periods
18
19. Queuing Discipline
Traditionally first in first out (FIFO) or first come first
served (FCFS) at each router port
No special treatment to high priority packets (flows)
Small packets held up by large packets ahead of them
in queue
Larger average delay for smaller packets
Flows of larger packets get better service
Greedy TCP connection can crowd out altruistic
connections
If one connection does not back off, others may
back off more
19
20. Fair Queuing (FQ)
Multiple queues for each port
One for each source or flow
Queues services round robin
Each busy queue (flow) gets exactly one packet per
cycle
Load balancing among flows
No advantage to being greedy
Your queue gets longer, increasing your delay
Short packets penalized as each queue sends one
packet per cycle
20
22. Processor Sharing
Multiple queues as in FQ
Send one bit from each queue per round
Longer packets no longer get an advantage
Can work out virtual (number of cycles) start and
finish time for a given packet
However, we wish to send packets, not bits
22
23. Bit-Round Fair Queuing (BRFQ)
Compute virtual start and finish time as before
When a packet finished, the next packet sent is the
one with the earliest virtual finish time
Good approximation to performance of PS
Throughput and delay converge as time increases
23
26. Generalized Processor Sharing (GPS)
BRFQ can not provide different capacities to different
flows
Enhancement called Weighted fair queue (WFQ)
From PS, allocate weighting to each flow that determines
how many bots are sent during each round
If weighted 5, then 5 bits are sent per round
Gives means of responding to different service requests
Guarantees that delays do not exceed bounds
26
29. Proactive Packet Discard
Congestion management by proactive packet discard
Before buffer full
Used on single FIFO queue or multiple queues for
elastic traffic
E.g. Random Early Detection (RED)
29
30. Random Early Detection(RED) Motivation
Surges fill buffers and cause discards
On TCP this is a signal to enter slow start phase, reducing load
Lost packets need to be resent
Adds to load and delay
Global synchronization
Traffic burst fills queues so packets lost
Many TCP connections enter slow start
Traffic drops so network under utilized
Connections leave slow start at same time causing burst
Bigger buffers do not help
Try to anticipate onset of congestion and tell one connection to slow
down
30
31. RED Design Goals
Congestion avoidance
Global synchronization avoidance
Current systems inform connections to back off
implicitly by dropping packets
Avoidance of bias to bursty traffic
Discard arriving packets will do this
Bound on average queue length
Hence control on average delay
31
32. RED Algorithm – Overview
Calculate average queue size avg
if avg < THmin
queue packet
else if THmin avg Thmax
calculate probability Pa
with probability Pa
discard packet
else with probability 1-Pa
queue packet
else if avg THmax
discard packet
32
35. Differentiated Services (DS)
ISA and RSVP complex to deploy
May not scale well for large volumes of traffic
Amount of control signals
Maintenance of state information at routers
DS architecture designed to provide simple, easy
to implement, low overhead tool
Support range of network services
Differentiated on basis of performance
35
36. Characteristics of DS
Use IPv4 header Type of Service or IPv6 Traffic Class field
No change to IP
Service level agreement (SLA) established between provider
(internet domain) and customer prior to use of DS
DS mechanisms not needed in applications
Build in aggregation
All traffic with same DS field treated same
E.g. multiple voice connections
DS implemented in individual routers by queuing and
forwarding based on DS field
State information on flows not saved by routers
36
38. Services
Provided within DS domain
Contiguous portion of Internet over which consistent set of
DS policies administered
Typically under control of one administrative entity
Defined in SLA
Customer may be user organization or other DS domain
Packet class marked in DS field
Service provider configures forwarding policies routers
Ongoing measure of performance provided for each class
DS domain expected to provide agreed service internally
If destination in another domain, DS domain attempts to forward
packets through other domains
Appropriate service level requested from each domain
38
39. SLA Parameters
Detailed service performance parameters
Throughput, drop probability, latency
Constraints on ingress and egress points
Indicate scope of service
Traffic profiles to be adhered to
Token bucket
Disposition of traffic in excess of profile
39
40. Example Services
Qualitative
A: Low latency
B: Low loss
Quantitative
C: 90% in-profile traffic delivered with no more than 50ms
latency
D: 95% in-profile traffic delivered
Mixed
E: Twice bandwidth of F
F: Traffic with drop precedence X has higher delivery
probability than that with drop precedence Y
40
42. DS Field Detail
Leftmost 6 bits are DS codepoint
64 different classes available
3 pools
xxxxx0 : reserved for standards
000000 : default packet class
xxx000 : reserved for backwards compatibility with
IPv4 TOS
xxxx11 : reserved for experimental or local use
xxxx01 : reserved for experimental or local use but may
be allocated for future standards if needed
Rightmost 2 bits unused
42
44. Configuration – Interior Routers
Domain consists of set of contiguous routers
Interpretation of DS codepoints within domain is consistent
Interior nodes (routers) have simple mechanisms to handle
packets based on codepoints
Queuing gives preferential treatment depending on
codepoint
Per Hop behaviour (PHB)
Must be available to all routers
Typically the only part implemented in interior routers
Packet dropping rule dictated which to drop when buffer
saturated
44
45. Configuration – Boundary Routers
Include PHB rules
Also traffic conditioning to provide desired service
Classifier
Separate packets into classes
Meter
Measure traffic for conformance to profile
Marker
Policing by remarking codepoints if required
Shaper
Dropper
45
47. Per Hop Behaviour – Expedited forwarding
Premium service
Low loss, delay, jitter; assured bandwidth end-to-end
service through domains
Looks like point to point or leased line
Difficult to achieve
Configure nodes so traffic aggregate has well defined
minimum departure rate
EF PHB
Condition aggregate so arrival rate at any node is
always less that minimum departure rate
Boundary conditioners
47
48. Per Hop Behaviour – Explicit Allocation
Superior to best efforts
Does not require reservation of resources
Does not require detailed discrimination among flows
Users offered choice of number of classes
Monitored at boundary node
In or out depending on matching profile or not
Inside network all traffic treated as single pool of
packets, distinguished only as in or out
Drop out packets before in packets if necessary
Different levels of service because different number of
in packets for each user
48
49. PHB - Assured Forwarding
Four classes defined
Select one or more to meet requirements
Within class, packets marked by customer or provider
with one of three drop precedence values
Used to determine importance when dropping
packets as result of congestion
49