• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. 29
  30. 30
  31. 31
  32. 32
  33. 33
  34. 34
  35. 35
  36. 36
  37. 37
  38. 38
  39. 39
  40. 40
  41. 41
  42. 42
  43. 43
  44. 44
  45. 45
  46. 46
  47. 47
  48. 48
  49. 49
  50. 50
  51. 51
  52. 52
  53. 53
  54. 54
  55. 55
  56. 56
  57. 57
  58. 58
  59. 59
  60. 60

Performance Evaluation of an End-to-End Measurement Based Call Admission Control Method

Extracts from this document...


Performance Evaluation of an End-to-End Measurement Based Call Admission Control Method 1. by Bal�zs So�s mailto:balazs@ks-studio.hu http://web.axelero.hu/kssoftware/balazs 2. Master's Thesis Submitted for the Diploma in Computer Science Department of Telecommunications and Telematics Budapest University of Technology and Economics Advisors: Istv�n Szab�,D�niel Orincsay,Ericsson Research Tibor Cinkler PhD, Budapest University of Technology and Economics Budapest, 2003 Abstract The modeling and the performance evaluation of Call Admission Control solutions in IP-network are still famous research areas in our days. One trend of these areas is represented by the End-to-End Measurement Based Call Admission Control methods. There are two main approaches of them: In the passive approach, the communicating endpoints are continuously tracing the main QoS features of the live traffic generated by themselves. They decide upon the gathered statistics if the network is capable of serving a new call demand, while preserving the adequate QoS in the network. In the active approach, the endpoints generate test-packets in the network to measure their delay and jitter in order to estimate the available network resources. In this thesis a new Call Admission Control method is proposed for IP-telephony-gateways that is based on the active method called Self Loading Periodic Streams (SLoPS). The basis of this admission control is that the gateways periodically test the actual available-bandwidth in the network with the generation of short probe-streams. If the packets of the streams get lost or suffer too long delay, then the given gateway does not admit any demands in the next period. On the other hand, if the probe-stream succeeds, so there is still available bandwidth capacity, then a given number of calls can be admitted in the network in the next period. The periodic testing causes a limited amount of overhead traffic for the network, but enables the immediate call admission control decision on a new demand's arrival. I have worked out and implemented this new call admission control method and run simulations in the network simulator ns-2 for a basic performance evaluation. ...read more.


Because the algorithm of D only calculates OWDs we fused the roles of S and D and implemented them in one algorithm. In Figure 5 we can see the flow chart of operation of an edge router using our call admission control. The first part of the diagram implements the role of the destination router D (Packet arrives with type (1), (2) and (3) parts), the rest implements the algorithm of the role of S. Figure 5 - Flowchart of Call Admission Control method in edge routers In the network a packet holds the following piece of information in its header for CAC: * * Packet type 1. 1. real voice stream packet 2. 2. probe-stream packet 3. 3. request for probe-stream statistics packet 4. 4. statistics packet * * Source node * * Destination node * * Stream ID (to which the packet is assigned) * * Sequence number in the stream * * Timestamp (sending time) Let's see what happens when a packet arrives at the edge router: If the destination router D receives a voice-stream packet (1), then it is simply forwarded out of the network. In case of D receives a probe-stream packet (2), D first takes a look at the Stream ID. If D knows about that probe stream, then records the packet's one-way-delay OWD (arrival time - send time) and adds information to the affected stream's statistics. If D does not know about the packet's stream, then inspects its Sequence number. If it is zero, then the packet is a new stream's first packet. New statistics file is opened for the new stream and measuring begins. If a packet with an unknown Stream ID and a Sequence number > 0 arrives, it is ignored. If D receives a request for probe-stream statistics packet (3), then the streams statistics is processed: The LP (number of lost packets), SPCT and SPDT metrics of the stream calculated and sent back to S in a probe-stream statistics packet (4). ...read more.


First, the questions of QoS were outlined. Then the concept of Differentiated Services was introduced, whose extension could be the new method. After that, network monitoring and its types, the active and the passive probing were discussed, which are essential for introducing different existing call admission control methods. After the classification of the existing admission controls and finding the place for the new method in the taxonomy, two active probing algorithms were introduced giving a base for the comparison to the new call admission control method. After presenting the base of the method, its full implementation was described in details. A sample simulation script needed for ns-2 was also discussed pausing on the used parameters. Simulations were run in a simple topology to get a rough estimate about the performance of the new call admission control method. The proposed algorithm in the tested environment was capable of offering 75-80 % network utilization, with less overhead traffic than 0.4% towards the (only) destination. The ratio of bad quality flows was under 0.4% almost always. 4.4.2. 4.4.2. Future Work Simulations and the investigation of performance could be extended to wider, multi-hop, best-effort scenarios, where this algorithm is run by more than one edge router. Experiments with dynamically changing conditions, e.g. background traffic would be interesting. It is probable that the adaptive choice of Testing Bandwidth could achieve better performance. The edge routers running the new method should measure the arrival rate of the incoming demands and should adjust Testing Bandwidth of the fleets. It would be also interesting to test the effectiveness of reducing (e.g. halving) the testing bandwidth of the fleets in the case they fail. Measurements should be done in order to compare the performances of this and other active end-to-end measurement based CAC methods. 5. 5. Acknowledgements This thesis could not have been completed without the kind help of Istv�n Szab�, who helped with his suggestions, advice and critics. Thank You! I also thank Daniel Orincsay for his useful comments! 6. 6. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    In the new system, data will be backed-up electronically using a data stick or a CD-ROM stored externally to the offices. * Security: - In the current system, all the filing cabinets that store the data are to be locked when they are not in use.

  2. Marked by a teacher

    Ecommerce Case Study

    Why E-commerce? A major benefit of ecommerce is that you are not do not suffer from geographical limitations. With a stand alone store you are limited to the number of products you can display and the number of which you can stock at any one time.

  1. The data Processing Cycle and processing methods

    The management will have to look at every aspect, but their main reason for their chose will be the size of the organisation. If the company is small and it only employs a few workers then a computerised system will not be needed.

  2. ICT 3b evaluation

    The radio, DVD player, CD player are all in one it makes the taxi drivers car more tidy and more easier to use them all whenever he wants. The car system has changed the way the adult works because it makes the taxi driver more joyful while he is at

  1. Free essay

    This research report will present a brief history of the Internet, focusing on some ...

    Canada, Hong Kong and Australia, alongside the previous Europe and the USA coverage. Following which, by the 1990s the IPSS were providing a worldwide networking infrastructure. n the 'n 1970's - Bulletin Boards and Newsgroups Bulletin Board Systems were in their prime during the late 1970s to the mid 1990s.

  2. ict as level coursework

    Here is an example of a user form resized and ready for designing. I will change the colour of the background as a starting point. 1 2 3 The print screens above demonstrate how to change the background colour of your user form.

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    ________________ Computer Misuse Act 1990- In Detail Computer misuses are criminal offences which are committed using a computer. The computer misuse act 1990 was designed to protect the integrity of computer systems by stopping hackers. They could use, steal and damage information.

  2. Discuss the Causes and Effects of the Digital Divide

    of the information age this is because the internet is the best place to learn a lot of things and people can educate themselves on it. There are many charities devoted into closing the gap and one of the best ways in which to do this is by giving more helpless people old computers that are no longer needed.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work