Free Essay

A Survey of Existing Qos Issues of Current Existing Transport Level Protocols

In:

Submitted By jashui
Words 2727
Pages 11
A Survey of existing QoS issues of current existing transport level protocols

Challenges to Enable Quality of Service (QoS) in TCP

Student Name: Fung Yin Man (13120129d)
Yu
Hui CheungYu (13001663d)
Date: 17/10/2014

Contents 1. Introduction - the brief view of p4

2. Overview - the p4-8 1. p5 2. p6-7 3. p7-8

3. Description of main challenging issues and technologies P9-10

4. Review of existing ____________ and developments P11

5. Future develop direction of p12

6. Conclusion p13

7. Reference p13 7.

ABSTRACT

Nowadays, TCP is a widely used transport protocol at Layer 4 in the World Wide Web for internet connection because it provides flow control and traffic retransmission in case of packet loss. In order to fulfill the highly demand of the traffic and there has been a dramatic increase in the processing power of workstation together with bandwidth of high speed network, additional advanced control mechanism/technologies should be applied to govern and provide rules to guarantee the service level of different kind of application running in the internet. This paper will simply introduce the importance and provide overview of Quality of Service (QoS) for transport level protocol especially in the area of TCP. Also, we will discuss the challenge of implementing the QoS in TCP which include but not limit to the fairness of sharing the bottle neck, how to feedback the congestion, how to involve the Internet router in a unicast/multicast routing environment. Some other deployment of QoS beside the wired network, such as how to leverage QoS in wireless communication and MPLS will also be examined. At last, we will study the possibility of adopting the QoS in the today networking hot topic SDN, software defined network.

Introduction

Why QoS? First let’s define QoS as the capability to apply an identifier to a specific type of traffic so the network infrastructure can treat it uniquely from other types. The primary goals of QoS is to provide priority including dedicated bandwidth, controlled jitter and latency (required by some real-time and interactive traffic), and improved loss characteristics. Then, why we apply QoS to one of the transport layer protocol (TCP)? It is because about 90% of the traffic in today’s packet networks are handled by TCP sessions.
The current trend in the networking world is convergence, voice, data and video are combined and one network carrying traffic and delivering services is the key driver to save business cost. The largest IP network is, of course, the global internet. The Internet has grown exponentially during the past few years, as has its usage and the number of available Internet-based applications. As the Internet and corporate intranets continue to grow, applications other than traditional data, such as Voice over IP (VoIP) and video-conferencing, are envisioned. More and more users and applications are coming on the Internet each day, and the Internet needs the functionality to support both existing and emerging applications and services. Applications have different quality of service (QoS) requirements. For example, video-on-demand applications can tolerate moderate end-to-end delay but require high throughput and very low error rate. In contrast, Internet telephony needs very low end-to-end latency but needs moderate throughput and a slightly higher error rate is acceptable. The Internet, in the past, has provided only best effort service with no predictable performance. Hence, for a specific traffic type, two factors must be considered, characterizing the behavior that the traffic requires from the network and determining which QOS tools can be set in motion to deliver that behavior.

In order to apply QoS into TCP, we shall familiar with TCP so knowledge of how it works is always important. TCP is a reliable, connection-oriented, three way handshakes, full-duplex, byte-stream transport-layer-protocol, which support congestion control and flow control. It also has following characteristics, TCP is adaptive. The window size, timers and other parameters are not statically defined and can vary during a TCP communication based on feedback messages between source and destination. TCP is greedy. It always tries to increase the sending and receiving windows to transmit more quickly. TCP is robust. The detection of packet loss because of receipt of duplicate ACKs or timeouts will cause TCP to slow down, but it is very eager to jump back into the fast lane again.

Besides, there are some of the parameters in the TCP exchange that set the tone for the session’s performance. The Maximum Segment Size (MSS), the congestion window (cwnd) and the sliding window. So in the perfect world, and the perfect network, the session’s speed is ramped up to the receiver‘s window size and the sender‘s congestion window. Any issues with the delivery are handled by the sequence control in the ACKs received and with the timeout window. Therefore, before we talk about the issue of enabling QoS in TCP, we shall have the overview of how it achieves the quality of service and its tools and mechanism, no matter in which transport protocol.

Overview of Basic QoS Architecture

The basic architecture introduces the three fundamental pieces for QoS implementation * QoS identification and marking techniques for coordinating QoS from end to end between network elements * QoS within a single network element (for example, queuing, scheduling, and traffic-shaping tools) * QoS policy, management, and accounting functions to control and administer end-to-end traffic across a network

Service levels refer to the actual end-to-end QoS capabilities, meaning the capability of a network to deliver service needed by specific network traffic from end to end or edge to edge. The services differ in their level of QoS strictness, which describes how tightly the service can be bound by specific bandwidth, delay, jitter, and loss characteristics.

In order to do this the network should implement service models so that services are specific to the traffic they service.

Three service models have been proposed and implemented till date.
1. Best Effort services
2. Integrated/Guaranteed services
3. Differentiated services.
1. Best Effort services
Basic connectivity with no guarantee as to whether or when a packet is delivered to the destination, although a packet is usually dropped only when the router input or output buffer queues are exhausted.
Best-effort service is not really a part of QoS because no service or delivery guarantees are made in forwarding best-effort traffic. This is the only service the Internet offers today.
Most data applications, such as File Transfer Protocol (FTP), work correctly with best-effort service, albeit with degraded performance. To function well, all applications require certain network resource allocations in terms of bandwidth, delay, and minimal packet loss.

2. Integrated/Guaranteed services

A service that requires network resource reservation to ensure that the network meets a traffic flow's specific service requirements.
Guaranteed service requires prior network resource reservation over the connection path. Guaranteed service also is referred to as hard QoS because it requires rigid guarantees from the network.
Path reservations with a granularity of a single flow don't scale over the Internet backbone, which services thousands of flows at any given time. Aggregate reservations, however, which call for only a minimum state of information in the Internet core routers, should be a scalable means of offering this service.
Applications requiring such service include multimedia applications such as audio and video. Interactive voice applications over the Internet need to limit latency to 100 ms to meet human ergonomic needs. This latency also is acceptable to a large spectrum of multimedia applications. Internet telephony needs at a minimum an 8-Kbps bandwidth and a 100-ms round-trip delay. The network needs to reserve resources to be able to meet such guaranteed service requirements.
Resource Reservation Protocol (RSVP) is suggested as the signaling protocol that delivers end-to-end service requirements.

RSVP enables applications to signal per-flow QoS requirements to the network. Service parameters are used to specifically quantify these requirements for admission control.

RSVP is used in multicast applications such as audio/video conferencing and broadcasting. Although the initial target for RSVP is multimedia traffic, there is a clear interest in reserving bandwidth for unicast traffic such as Network File System (NFS), and for Virtual Private Network (VPN) management.

The RSVP daemon in a router communicates with two local decision modules—admission control and policy control—before making a resource reservation. Admission control determines whether the node has sufficient available resources to supply the requested QoS. Policy control determines whether the user has administrative permission to make the reservation. If either check fails, the RSVP daemon sends an error notification to the application process that originated the request. If both checks succeed, the RSVP daemon sets parameters in a packet classifier and a packet scheduler to obtain the desired QoS. The packet classifier determines the QoS class for each packet, and the packet scheduler orders packet transmission based on its QoS class. The Weighted Fair Queuing (WFQ) and Weighted Random Early Detection (WRED) disciplines provide scheduler support for QoS.

3. Differentiated service

In differentiated service, traffic is grouped into classes based on their service requirements. Each traffic class is differentiated by the network and serviced according to the configured QOS mechanisms for the class. This scheme for delivering QOS is often referred to as COS.
Note that differentiated service doesn't give service guarantees per session. It only differentiates traffic and allows a preferential treatment of one traffic class over the other. For this reason, this service is also referred as soft QOS.
This QoS scheme works well for bandwidth-intensive data applications. It is important that network control traffic is differentiated from the rest of the data traffic and prioritized so as to ensure basic network connectivity all the time. Its aim is to define the differentiated services (DS) byte, the Type of Service (ToS) byte from the Internet Protocol (IP) Version 4 header and the Traffic Class byte from IP Version 6, and mark the standardized DS byte of the packet such that it receives a particular forwarding treatment, or per-hop behavior (PHB), at each network node. The performance level needed on a packet-by-packet basis by simply marking the packet's Differentiated Services Code Point (DSCP) field to a specific value. This value specifies the PHB given to the packet within the service provider network. Typically, the service provider and customer negotiate a profile describing the rate at which traffic can be submitted at each service level. Packets submitted in excess of the agreed profile might not be allotted the requested service level.
The IETF diffserv group is in the process of standardizing an effort that enables users to mark 6 bits of the ToS byte in the IP header with a DSCP. The lowest-order 2 bits are currently unused (CU). DSCP is an extension to 3 bits used by IP precedence. Like IP precedence, you can use DSCP to provide differential treatment to packets marked appropriately. We can specify PHBs in terms of their relative priority in access to resources, or in terms of their relative traffic performance characteristics. Two PHBs, EF and AF, are defined. EF is targeted at real-time applications, such as VoIP. AF provides different forwarding assurance levels for packets based on their DSCP field.

Both 3-bit IP precedence and 6-bit DSCP fields are used in exactly the same purpose in a diffserv network: for marking packets at the network edge and triggering specific packet queuing/discard behavior in the network. Further, the DSCP field definition is backward-compatible with the IP precedence values. Hence, DSCP field support doesn't require any change in the existing basic functionality and architecture. Soon, all IP QoS functions will support the DSCP field along with IP precedence.

So, how QoS can be applied in these model or architecture in details? Let’s focus on the analysis of TCP transport protocol to demonstrate different approach.

TCP Congestion Mechanism

TCP uses a mechanism called slow-start to increase the congestion window after a connection is initialized. It starts with a window of one to two times the MSS. Although the initial rate is low, it increases rapidly. For every packet acknowledged, the congestion window increases until the sending or receiving window is full. If an ACK is not received within the expected time, the TCP stack reduces its speed by reverting to slow start state, and the whole process starts all over again. Congestion avoidance is based on how a node reacts to duplicate ACKs. The behavior of Tahoe and Reno differ in how they detect and react to packet loss.

Tahoe detects loss when a timeout expires before an ACK is received or if three duplicate ACKs are received (four, if the first ACK has been counted). Tahoe then reduces the congestion window to 1 MSS and resets to the slow-start state. The server instantly starts retransmitting older unacknowledged packets, presuming they have also been lost.

Reno begins with the same behavior. However, if three duplicate ACKs are received
(four, if the first ACK has been counted), Reno halves the congestion window to the slow - start threshold (ssthresh) and performs a fast retransmission. The term “fast retransmission” is actually misleading; it’s more of a delayed retransmission so when the node has received a duplicate ACK, it does not immediately respond and retransmit; instead, it waits for more than three duplicate ACK before retransmitting the packet. The reason for this is to possibly save bandwidth and throughput in case the packet was reordered and not really dropped. Reno also enters a phase called Fast Recovery. If an ACK times out, slow - start is used, as with Tahoe.

TCP always try to get more, with the result that it will be taken to school by the network and be shaped due to jitter in arrival, reorder of segments, drops, or session RTT timeouts. The TCP throughput and congestion avoidance tools are tightly bound to each other when it comes to the performance of TCP sessions. With current operating systems, a single drop or reordering of a segment does not cause too much harm to the sessions. The rate and size of both the receiver window and the sender cwnd are maintained very effectively and can be rapidly adjusted in response to duplicate ACKs.

Several features and tools are designed to handle pacing of TCP sessions, for example, RED, token bucket policing, and leaky bucket shaping. Some of these tools are TCP-friendly, while others are link and service-based. These tools can be used to configure whether a certain burst is allowed, thereby allowing the packet rate peak to exceed a certain bandwidth threshold to maintain predictable rates and stability, or whether the burst should be strictly controlled to stop possible issues associated with misconfigured or misbehaving sources as close to the source as possible. These tools can also be used to configure whether buffers are large, to allow as much of burst as possible to avoid retransmissions and keep up the rate, or small, to avoid delay, jitter and the build-up of massive windows, which result in massive amounts of retransmissions and reordering later on.

The random early detection (RED) algorithms are designed to avoid congestion in internetworks before it becomes a problem. RED works by monitoring traffic load at points in the network and stochastically discarding packets if the congestion begins to increase. The result of the drop is that the source detects the dropped traffic and slows its transmission. RED is primarily designed to work with TCP in IP internetwork environments.

The precedence levels can be defined with token bucket control mechanism. Token bucket is a control mechanism that dictates when traffic can be transmitted based on the precedence of tokens in bucket. This provides means to control bursts. Tokens are specified in number of bytes. Thresholds can be set for the bursts of traffic. In case of a burst the token bucket mechanism slows down the traffic. In token bucket mechanism the incoming IP packets are queued for processing per flow basis. In the queue it is checked that their allowed amount / time is not exceeded. If not, then the packets are sent, if exceeded the behavior is not yet standardized. The common possibilities are best effort, discard or marking the packet so that it can be discarded in the future.

Similar Documents

Free Essay

Cognitive Radio

...2013 International Conference on Intelligent Systems and Signal Processing (ISSP) 5G Technology of Mobile Communication: A Survey Asvin Gohil Charotar University of Science and Technology. Changa-388421, Gujarat, India Hardik Modi Charotar University of Science and Technology. Changa-388421, Gujarat, India modi8584@yahoo.com Shobhit K Patel Charotar University of Science and Technology. Changa-388421, Gujarat, India shobhit_65@yahoo.com Abstract- The objective of this paper is comprehensive study related to 5G technology of mobile communication. Existing research work in mobile communication is related to 5G technology. In 5G, researches are related to the development of World Wide Wireless Web (WWWW), Dynamic Adhoc Wireless Networks (DAWN) and Real Wireless Communication. The most important technologies for 5G technologies are 802.11 Wireless Local Area Networks (WLAN) and 802.16 Wireless Metropolitan Area Networks (WMAN), Ad-hoc Wireless Personal Area Network (WPAN) and Wireless networks for digital communication. 4G technology will include several standards under a common umbrella, similar to 3G, but with IEEE 802.xx wireless mobile networks integrated from the commencement. The major contribution of this paper is the key provisions of 5G (Fifth Generation) technology of mobile communication, which is seen as consumer oriented. In 5G technology, the mobile consumer has given utmost priority compared to others. 5G Technology stands for 5th Generation Mobile Technology...

Words: 3612 - Pages: 15

Premium Essay

Voice, Video, Network

...VOICE, VIDEO, AND DATA NETWORK CONVERGENCE VOICE, VIDEO, AND DATA NETWORK CONVERGENCE ARCHITECTURE AND DESIGN, FROM VOIP TO WIRELESS JUANITA ELLIS CHARLES PURSELL JOY RAHMAN Amsterdam Boston London New York Oxford San Francisco Singapore Sydney Tokyo Paris San Diego This book is printed on acid-free paper. Copyright 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: permissions@elsevier.com.uk. You may also complete your request on-line via the Elsevier Science homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Explicit permission from Academic Press is not required to reproduce a maximum of two figures or tables from an Academic Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press An imprint of Elsevier Science 525 B Street, Suite 1900, San Diego, California 92101-4495, USA http://www.academicpress.com Academic Press 84 Theobald’s Road, London WC1X 8RR...

Words: 125371 - Pages: 502

Premium Essay

Sql Quiz

...abstract of the document here. The abstract is typically a short summary of the contents of the document. Type the abstract of the document here. The abstract is typically a short summary of the contents of the document.] | Internetworking Basics An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry, products, and procedures that meet the challenge of creating and administering internetworks. The following articles provide information about internetworking basics: * Internetworking Basics * Introduction to LAN Protocols * Introduction to WAN Technologies * Bridging and Switching Basics * Routing Basics * Network Management Basics * Open System Interconnection Protocols LAN Technologies A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications. The following articles provide information different LAN technologies: * Ethernet Technologies * Token Ring/IEEE 802.5 WAN Technologies A WAN is a data communications network that covers a relatively broad geographic area and that often...

Words: 217433 - Pages: 870

Premium Essay

Thesis

...se A Global Uniform Standard for Secure Service Provision over 4G Infrastructures. 4G Networks:Generation of Wireless network Since their birth in the early seventeenth and all along their di_erent generations, mobile communication networks have crossed important evolutionary phases aiming to de_ne increasingly sophisticated technologies allowing the provision of seamless global roaming, quality of service, and high data rates. Today, numerous technologies are co-existing to provide a unifying set of services. The coming era of 4th generation networks is foreseeing a potential smooth merging of all these heterogeneous technologies. A 4G network is characterized by the integration and the convergence of all communication networks, which are intrinsically characterized by their diversity, their heterogeneity, and their dynamicity, into one network. The main challenges raised by this network are the guarantee of seamless global roaming, the provision of cost effective high data rates, the definition of efficient user-centric customized service models, and the optimization of the quality of service provision. 1.1:Generation: 1.1.1:Wireless first generation overview (1G) 1G (or 1-G) refers to the first generation of wireless telephone technology...

Words: 6883 - Pages: 28

Premium Essay

Wireless Network for Rural

...architecture has largely been inspired by my prior work on WiFi-based Long Distance (WiLD) Networks [42, 62, 35, 54, 64, 34], a low cost point-to-point network connectivity solution that provides very high bandwidth (typically 6− 10 Mbps) over very long-distances. While prior work on WiLD networks [48, 5, 42, 62, 35] has made significant progress in the design of highperformance MAC layer solutions, we still lack a vision of how to design a comprehensive, low-cost, rural connectivity architecture that can efficiently support a wide-range of applications. It is this goal that I wish to achieve in the WiRE network architecture design. To realize this architectural vision, we need to address several challenges at various protocol layers including the MAC, network, transport and the application layers. We will first motivate the need for low-cost connectivity before we outline these challenges in greater detail. Motivation: Need for Low-Cost Rural Connectivity As of Internet...

Words: 10544 - Pages: 43

Premium Essay

Top Down Cisco

...Top-Down Network Design Third Edition Priscilla Oppenheimer Priscilla Oppenheimer Cisco Press 800 East 96th Street Indianapolis, IN 46240 ii Top-Down Network Design Top-Down Network Design, Third Edition Priscilla Oppenheimer Copyright© 2011 Cisco Systems, Inc. Published by: Cisco Press 800 East 96th Street Indianapolis, IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without written permission from the publisher, except for the inclusion of brief quotations in a review. Printed in the United States of America First Printing August 2010 Library of Congress Cataloging-in-Publication data is on file. ISBN-13: 978-1-58720-283-4 ISBN-10: 1-58720-283-2 Warning and Disclaimer This book is designed to provide information about top-down network design. Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information is provided on an “as is” basis. The author, Cisco Press, and Cisco Systems, Inc. shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book or from the use of the discs or programs that may accompany it. The opinions expressed in this book belong to the author and are not necessarily those of Cisco...

Words: 79785 - Pages: 320

Premium Essay

Unknown

...Medical Device Networking for Smarter Healthcare: Part 3 Next-Generation WLAN Deployments in Hospitals Lantronix, Inc. 167 Technology Drive Irvine, CA 92618 Tel: +1 (800) 422-7055 Fax: +1 (949) 450-7232 www.lantronix.com Medical Device Networking for Smarter Healthcare: Part 3 of 4 Contents Introduction..................................................................................................................................................... 3 Wireless Roll-outs........................................................................................................................................... 5 Medical Device Connectivity / Mobile Carts .......................................................................................... 5 Handheld Devices .................................................................................................................................... 6 Computer-based Physician Order Entry (CPOE)..................................................................................... 7 Next-Generation Wireless Applications ......................................................................................................... 7 Location-based Services .......................................................................................................................... 7 Voice-over-WLAN .................................................................................................................................. 8 Internet/Intranet...

Words: 4973 - Pages: 20

Free Essay

Cloud Load Balancing Techniques : a Step Towards Green Computing

...IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 1, January 2012 ISSN (Online): 1694-0814 www.IJCSI.org 238 Cloud Load Balancing Techniques : A Step Towards Green Computing Nidhi Jain Kansal1, Inderveer Chana2 1 Computer Science and Engineering Department, Thapar University Patiala-147004, Punjab, India 2 Computer Science and Engineering Department, Thapar University Patiala-147004, Punjab, India Abstract Cloud computing is emerging as a new paradigm of large-scale distributed computing. It is a framework for enabling convenient, on-demand network access to a shared pool of computing resources. Load balancing is one of the main challenges in cloud computing which is required to distribute the dynamic workload across multiple nodes to ensure that no single node is overwhelmed. It helps in optimal utilization of resources and hence in enhancing the performance of the system. The goal of load balancing is to minimize the resource consumption which will further reduce energy consumption and carbon emission rate that is the dire need of cloud computing. This determines the need of new metrics, energy consumption and carbon emission for energy-efficient load balancing in cloud computing. This paper discusses the existing load balancing techniques in cloud computing and further compares them based on various parameters like performance, scalability, associated overhead etc. that are considered in different techniques. It further discusses...

Words: 5791 - Pages: 24

Premium Essay

The Internet of Things

...and sharing with colleagues. Other uses, including reproduction and distribution, or selling or licensing copies, or posting to personal, institutional or third party websites are prohibited. In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier’s archiving and manuscript policies are encouraged to visit: http://www.elsevier.com/authorsrights Author's personal copy Journal of Network and Computer Applications 42 (2014) 120–134 Contents lists available at ScienceDirect Journal of Network and Computer Applications journal homepage: www.elsevier.com/locate/jnca A survey on trust management for Internet of Things Zheng Yan a,b,n,1, Peng Zhang c, Athanasios V. Vasilakos d a The State Key Laboratory of ISN, Xidian University, PO Box 119, No. 2...

Words: 18072 - Pages: 73

Free Essay

Lbs-Challenges in M Commerce

...advertising will become more pervasive and profitable, but not before addressing key technical and business challenges. By Subhankar Dhar and Upkar Varshney Challenges and Business Models for Mobile Location-based Services and Advertising for wireless cellular networks in the U.S. have also enabled location-based functionalities using variations of triangulation, GPS, and cell-ID technologies. In addition to the current and emerging satellite-based systems, such as GPS (U.S.), GLONASS (Russian), GALILEO (EU), and COMPASS (China),30 which will provide wider coverage to benefit location-based services. In some cases locational information can also be derived and utilized from sensors, RFID, Bluetooth, WiMax, and Wireless LANs.7,31,32 These systems can be used standalone or supplement the coverage for location tracking in indoor environments, where satellite coverage is intermittent or inaccurate. The potential for location-based services is evident from powerful and ubiquitous wireless devices that are growing in popularity.8,23 Many surveys predict billions of dollars in revenues for mobile advertising.27 Mobile Network Operators are well positioned to take up a significant percent of this advertising revenue as they negotiate deals with content providers. Recent deals between media companies, advertising agencies and Internet/software industry also demonstrate significant optimism for future growth.4,19 However, there are many challenges that have...

Words: 7416 - Pages: 30

Premium Essay

Internet

...The Future of the Internet A Compendium of European Projects on ICT Research Supported by the EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia Europe Direct is a service to help you find answers to your questions about the European Union New freephone number * 00 800 6 7 8 9 10 11 Certain mobile telephone operators do not allow access to 00800 numbers or these calls may be billed. In certain cases, these calls may be chargeable from telephone boxes or hotels. «The views expressed are those of the authors and not necessarily those of the European Commission or any of its officials» A great deal of additional information on the European Union is available on the Internet. It can be accessed through the Europa server (http://www.europa.eu). Cataloguing data can be found at the end of this publication. ISBN 978-92-79-08008-1 © European Communities, 2008 Reproduction is authorised provided the source is acknowledged. Printed in Belgium PRINTED ON CHLORE FREE PAPER The Future of the Internet A Compendium of European Projects on ICT Research Supported by the EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia ••• 2 Preface 5 priorities identified by the Internet Governance Forum: openness, security, access, diversity and critical Internet resources. The use of the Internet in public policies will considerably grow in areas such as education, culture, health and e-government...

Words: 66329 - Pages: 266

Premium Essay

Cloud Computing

...access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Parallels to this concept can be drawn with the electricity grid, where end-users consume power without needing to understand the component devices or infrastructure required to provide the service. Cloud computing describes a new supplement, consumption, and delivery model for IT services based on Internet protocols, and it typically involves provisioning of dynamically scalable and often virtualized resources It is a byproduct and consequence of the ease-of-access to remote computing sites provided by the Internet. This frequently takes the form of web-based tools or applications that users can access and use through a web browser as if they were programs installed locally on their own computers.[5] Typical cloud computing providers deliver common business applications online that are accessed from another Web service or software like a Web browser, while the software and data are stored on servers. Most cloud computing infrastructures consist of services delivered through common centers and...

Words: 2157 - Pages: 9

Premium Essay

Green Cloud Computing

...Cloud infrastructure has drastically increased the energy consumption of data centers, which has become a critical issue. High energy consumption not only translates to high operational cost, which reduces the profit margin of Cloud providers, but also leads to high carbon emissions which is not environmentally friendly. Hence, energy-efficient solutions are required to minimize the impact of Cloud computing on the environment. In order to design such solutions, deep analysis of Cloud is required with respect to their power efficiency. Thus, in this chapter, I discuss various elements of Clouds which contribute to the total energy consumption and how it is addressed in the literature. I also discuss the implication of these solutions for future research directions to enable green Cloud computing. The paper also explains the role of Cloud users in achieving this goal. Table of Contents ABSTRACT: 2 1. Introduction 3 2. What is Cloud computing? 6 2.1 Cloud Computing Characteristics 7 2.2 Components of Cloud Computing 8 2.3 Cloud Computing Deployment Models 10 3. Cloud Computing and Energy Usage Model: A Typical Example 12 4. Features of Clouds enabling Green computing 13 5. Towards Energy Efficiency of Cloud computing: State-of-the-Art 15 5.1 Applications 15 5.2 Cloud Software Stack: Virtualization and Provisioning 15 5.3 Datacenter level: Cooling, Hardware, Network, and Storage 15 5.4 Monitoring/Metering 16 5.5. Network Infrastructure 16 6. Green...

Words: 5257 - Pages: 22

Free Essay

Computer Networking

...Components 1.2. Network Types 1.3. The OSI Model 1.3.1. The Physical Layer 1.3.2. The Data Link Layer 1.3.3. The Network Layer 1.3.4. The Transport Layer 1.3.5. The Session Layer 1.3.6. The Presentation Layer 1.3.7. The Application Layer 1.4. Protocol Notations 1.4.1. Service Primitives 1.4.2. Sequence Diagrams 1.4.3. State Transition Diagrams 1.5. Standards 1.6. Further Reading 1.7. Summary 1.8. Exercises 2. The Physical Layer 2.1. Equipment 2.1.1. Equipment Types 2.1.2. Connection Types 2.2. Transmission 2.2.1. Signal Types 2.2.2. Modulation 2.2.3. Digitization 2.2.4. Synchronization 2.2.5. Transmission Media 2.3. Multiplexing 2.3.1. Space Division Multiplexing (SDM) vi Communication Networks 6 10 1 2 2 4 7 7 8 9 9 10 10 11 11 12 12 13 14 15 16 18 19 19 19 20 20 21 22 23 24 27 28 Copyright © 2005 PragSoft 2.3.2. Frequency Division Multiplexing (FDM) 2.3.3. Time Division Multiplexing (TDM) 2.3.4. Concentration 2.4. Physical Layer Standards 2.4.1. RS-232 2.4.2. CCITT X.21 2.5. Further Reading 2.6. Summary 2.7. Exercises 3. The Data Link Layer 3.1 Link Protocol Types 3.1.1. Synchronous Protocols 3.1.2. Asynchronous Protocols 3.1.3. Master-Slave Protocols 3.1.4. Peer-to-Peer Protocols 3.2. Link Protocol Functions 3.2.1. Acknowledgments 3.2.2. Timers 3.2.3. Error Checking 3.2.4. Retransmission 3.2.5. Flow Control 3.3. Sliding Window Protocol 3.4. Data Link Layer Standards 3.4.1. BSC 3.4.2. HDLC 3.5. Further Reading 3.6. Summary 3.7. Exercises 4. The Network Layer 4.1. Network...

Words: 60074 - Pages: 241

Premium Essay

Test

...has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the past thirteen years, and still new articles appear saying similar warnings, with only the solutions evolving with the technology. Suggested solutions will include security literacy regarding APs and their devices and their compliance; security audits to re-evaluate configurations of current hardware and software, inventory of current APs, wireless devices, ports, stations and their...

Words: 18577 - Pages: 75