• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  15. 15
    15
  16. 16
    16
  17. 17
    17
  18. 18
    18
  19. 19
    19
  20. 20
    20
  21. 21
    21
  22. 22
    22
  23. 23
    23
  24. 24
    24
  25. 25
    25
  26. 26
    26
  27. 27
    27
  28. 28
    28
  29. 29
    29
  30. 30
    30
  31. 31
    31
  32. 32
    32
  33. 33
    33
  34. 34
    34
  35. 35
    35
  36. 36
    36
  37. 37
    37
  38. 38
    38
  39. 39
    39
  40. 40
    40
  41. 41
    41
  42. 42
    42
  43. 43
    43
  44. 44
    44
  45. 45
    45
  46. 46
    46
  47. 47
    47
  48. 48
    48
  49. 49
    49
  50. 50
    50
  51. 51
    51
  52. 52
    52
  53. 53
    53
  54. 54
    54
  55. 55
    55
  56. 56
    56
  57. 57
    57
  58. 58
    58
  59. 59
    59
  60. 60
    60

Performance Evaluation of an End-to-End Measurement Based Call Admission Control Method

Extracts from this document...

Introduction

Performance Evaluation of an End-to-End Measurement Based Call Admission Control Method 1. by Bal�zs So�s mailto:[email protected] http://web.axelero.hu/kssoftware/balazs 2. Master's Thesis Submitted for the Diploma in Computer Science Department of Telecommunications and Telematics Budapest University of Technology and Economics Advisors: Istv�n Szab�,D�niel Orincsay,Ericsson Research Tibor Cinkler PhD, Budapest University of Technology and Economics Budapest, 2003 Abstract The modeling and the performance evaluation of Call Admission Control solutions in IP-network are still famous research areas in our days. One trend of these areas is represented by the End-to-End Measurement Based Call Admission Control methods. There are two main approaches of them: In the passive approach, the communicating endpoints are continuously tracing the main QoS features of the live traffic generated by themselves. They decide upon the gathered statistics if the network is capable of serving a new call demand, while preserving the adequate QoS in the network. In the active approach, the endpoints generate test-packets in the network to measure their delay and jitter in order to estimate the available network resources. In this thesis a new Call Admission Control method is proposed for IP-telephony-gateways that is based on the active method called Self Loading Periodic Streams (SLoPS). The basis of this admission control is that the gateways periodically test the actual available-bandwidth in the network with the generation of short probe-streams. If the packets of the streams get lost or suffer too long delay, then the given gateway does not admit any demands in the next period. On the other hand, if the probe-stream succeeds, so there is still available bandwidth capacity, then a given number of calls can be admitted in the network in the next period. The periodic testing causes a limited amount of overhead traffic for the network, but enables the immediate call admission control decision on a new demand's arrival. I have worked out and implemented this new call admission control method and run simulations in the network simulator ns-2 for a basic performance evaluation. ...read more.

Middle

Because the algorithm of D only calculates OWDs we fused the roles of S and D and implemented them in one algorithm. In Figure 5 we can see the flow chart of operation of an edge router using our call admission control. The first part of the diagram implements the role of the destination router D (Packet arrives with type (1), (2) and (3) parts), the rest implements the algorithm of the role of S. Figure 5 - Flowchart of Call Admission Control method in edge routers In the network a packet holds the following piece of information in its header for CAC: * * Packet type 1. 1. real voice stream packet 2. 2. probe-stream packet 3. 3. request for probe-stream statistics packet 4. 4. statistics packet * * Source node * * Destination node * * Stream ID (to which the packet is assigned) * * Sequence number in the stream * * Timestamp (sending time) Let's see what happens when a packet arrives at the edge router: If the destination router D receives a voice-stream packet (1), then it is simply forwarded out of the network. In case of D receives a probe-stream packet (2), D first takes a look at the Stream ID. If D knows about that probe stream, then records the packet's one-way-delay OWD (arrival time - send time) and adds information to the affected stream's statistics. If D does not know about the packet's stream, then inspects its Sequence number. If it is zero, then the packet is a new stream's first packet. New statistics file is opened for the new stream and measuring begins. If a packet with an unknown Stream ID and a Sequence number > 0 arrives, it is ignored. If D receives a request for probe-stream statistics packet (3), then the streams statistics is processed: The LP (number of lost packets), SPCT and SPDT metrics of the stream calculated and sent back to S in a probe-stream statistics packet (4). ...read more.

Conclusion

First, the questions of QoS were outlined. Then the concept of Differentiated Services was introduced, whose extension could be the new method. After that, network monitoring and its types, the active and the passive probing were discussed, which are essential for introducing different existing call admission control methods. After the classification of the existing admission controls and finding the place for the new method in the taxonomy, two active probing algorithms were introduced giving a base for the comparison to the new call admission control method. After presenting the base of the method, its full implementation was described in details. A sample simulation script needed for ns-2 was also discussed pausing on the used parameters. Simulations were run in a simple topology to get a rough estimate about the performance of the new call admission control method. The proposed algorithm in the tested environment was capable of offering 75-80 % network utilization, with less overhead traffic than 0.4% towards the (only) destination. The ratio of bad quality flows was under 0.4% almost always. 4.4.2. 4.4.2. Future Work Simulations and the investigation of performance could be extended to wider, multi-hop, best-effort scenarios, where this algorithm is run by more than one edge router. Experiments with dynamically changing conditions, e.g. background traffic would be interesting. It is probable that the adaptive choice of Testing Bandwidth could achieve better performance. The edge routers running the new method should measure the arrival rate of the incoming demands and should adjust Testing Bandwidth of the fleets. It would be also interesting to test the effectiveness of reducing (e.g. halving) the testing bandwidth of the fleets in the case they fail. Measurements should be done in order to compare the performances of this and other active end-to-end measurement based CAC methods. 5. 5. Acknowledgements This thesis could not have been completed without the kind help of Istv�n Szab�, who helped with his suggestions, advice and critics. Thank You! I also thank Daniel Orincsay for his useful comments! 6. 6. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Ecommerce Case Study

    By using ecommerce in cuckoo games it will unable to encourage customers to purchase new line products in the same way they are able to in store. There is always the element of authenticity for customers when browsing websites online as there is very little regulation on who can and

  2. Personal effectiveness

    Movements of the body can assist other people in understanding the true meaning of the message that is being sent. For example yawns, facial expressions and eye contact. Perception is vital and focuses on the tone of voice, silences between answers and the speed of delivery.

  1. communication and values

    Then I watched my clients non-verbal response by seeing them smiling and looking interested. From looking at their face I realised that whether they are confused or not. I listened to their responses to what I said through my interactions by answering their questions and try to make sense of their responses by asking them do they understand.

  2. Communication technologies. choose and justify the choice of a particular access control method ...

    CSMA CA avoids collision among sharing stations, the medium utilizes the RTS request to send and the CTS clear to send. when the station's physical indicates a busy medium. Once a frame has been sent, the station must wait until the time gap is up before re-trying to transmit again,

  1. The aim of this task is to produce a report for the managing director ...

    Another advantage is that they can work where mobile phones do not. This is useful for rescue services attending to mountains or out at sea. A disadvantage of radios is that they don't have that greater range so can only cover a very local area.

  2. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    * The user must be able to add new employee records, edit employee records and search for a particular employee's record. * The user must be able to add new products, edit products and search for a product within the database.

  1. Explain the functions of network management

    The main job of a fault management is to deal with any hardware or software faults and failures that stop the network to work correctly. Faults such as hardware corruption can result in data loss and damage to network. This can be prevented if a fault manager monitors the performance of hard drive to see if it functions correctly.

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    These include many skills which all rely on the dependently of the employee and how they can amend to the ethos of the workplace and help others to achieve it too. Punctuality- This means coming to the workplace on time and keeping that consistent, employers like employees who come to work on time.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work