11 |
Avaliação de desempenho de variantes dos Protocolos DCCP e TCP em cenários representativosDoria, Priscila Lôbo Gonçalves 15 May 2012 (has links)
The Datagram Congestion Control Protocol (DCCP) is a prominent transport protocol that has attracted the attention of the scientific community for its rapid progress and good
results. The main novelty of DCCP is the performance priority design, as in UDP, however with congestion control capabilities, as in TCP. Literature about DCCP is still scarce and needs to be complemented to gather enouth scientific elements to support new research properly. In this context, this work joins the efforts of the scientific community to analise, mensure, compare and characterize DCCP in relevant scenarios that cover many real world situations. Three open questions were preliminarly identified in the literature: How DCCP behaves (i) when fighting for the same link bandwidth with other transport protocols; (ii)
with highly relevant ones (e.g., Compound TCP, CUBIC) and (iii) fighting for the same link bandwidth with Compound TCP and CUBIC, adopting multimedia applications (e.g., VoIP). In this work, computational simulations are used to compare the performance of two DCCP variants (DCCP CCID2 and DCCP CCID3) with three highly representative TCP variants
(Compound TCP, CUBIC and TCP SACK), in real world scenarios, including concurrent use of the same link by protocols, link errors and assorted bandwidths, latencies and traffic
patterns. The simulation results show that, under contention, in most scenarios DCCP CCID2 has achieved higher throughput than Compound TCP or TCP SACK. Throughout
the simulations there was a tendency of DCCP CCID3 to have lower throughput than the other chosen protocol. However, the results also showed that DCCP CCID3 has achieved
significanly better throughput in the presence of link errors and higher values of latency and bandwidth, eventualy outperforming Compound TCP and TCP SACK. Finally, there was a
tendency of predominance of CUBIC´ throughtput, which can be explained by its aggressive algorithm (i.e., non-linear) of return of the transmission window to the previous value before
the discard event. However, CUBIC has presented the highest packet drop and the lowest delivery rate. / O Datagram Congestion Control Protocol (DCCP) é um proeminente protocolo de transporte que vem atraindo a atenção da comunidade científica pelos seus rápidos avanços e bons resultados. A principal inovação do DCCP é a priorização de desempenho, como ocorre com o UDP, mas com capacidade de realizar controle de congestionamento, como ocorre com o
TCP. Entretanto, a literatura sobre o DCCP ainda é escassa e necessita ser complementada para trazer elementos científicos suficientes para novas pesquisas. Neste contexto, este trabalho
vem se somar aos esforços da comunidade científica para analisar, mensurar, comparar e caracterizar o DCCP em cenários representativos que incorporem diversas situações de uso.
Identificaram-se então três questões alvo, ainda em aberto na literatura: qual é o comportamento do DCCP (i) quando disputa o mesmo enlace com outros protocolos de transporte;
(ii) com protocolos de transporte relevantes (e.g., Compound TCP, CUBIC) e (iii) em disputa no mesmo enlace com o Compound TCP e o CUBIC, utilizando aplicações multimídia
(e.g., VoIP). Neste trabalho, simulações computacionais são utilizadas para comparar duas variantes do DCCP (CCID2 e CCID3) a três variantes do TCP (Compound TCP, CUBIC e
TCP SACK), em cenários onde ocorrem situações de mundo real, incluindo utilização concorrente do enlace pelos protocolos, presença de erros de transmissão no enlace, variação de
largura de banda, variação de latência, e variação de padrão e distribuição de tráfego. Os resultados das simulações apontam que, sob contenção, na maioria dos cenários o DCCP
CCID2 obteve vazão superior à do Compound TCP, do DCCP CCID3 e do TCP SACK. Ao longo das simulações observou-se uma tendência do DCCP CCID3 a ter vazão inferior à
dos demais protocolos escolhidos. Entretanto, os resultados apontaram que o DCCP CCID3 obteve desempenho significativamente melhor na presença de erros de transmissão e com valores maiores de latência e de largura de banda, chegando a ultrapassar a vazão do DCCP CCID2 e do TCP SACK. Por fim, observou-se uma tendência de predominância do protocolo CUBIC no tocante à vazão, que pode ser determinada pelo seu algoritmo agressivo (i.e., não-linear) de retorno da janela de transmissão ao valor anterior aos eventos de descarte.
Entretanto, o CUBIC apresentou o maior descarte de pacotes e a menor taxa de entrega.
|
12 |
OPNET simulation of voice over MPLS With Considering Traffic EngineeringRadhakrishna, Deekonda, Keerthipramukh, Jannu January 2010 (has links)
Multiprotocol Label Switching (MPLS) is an emerging technology which ensures the reliable delivery of the Internet services with high transmission speed and lower delays. The key feature of MPLS is its Traffic Engineering (TE), which is used for effectively managing the networks for efficient utilization of network resources. Due to lower network delay, efficient forwarding mechanism, scalability and predictable performance of the services provided by MPLS technology makes it more suitable for implementing real-time applications such as voice and video. In this thesis performance of Voice over Internet Protocol (VoIP) application is compared between MPLS network and conventional Internet Protocol (IP) network. OPNET modeler 14.5 is used to simulate the both networks and the comparison is made based on some performance metrics such as voice jitter, voice packet end-to-end delay, voice delay variation, voice packet sent and received. The simulation results are analyzed and it shows that MPLS based solution provides better performance in implementing the VoIP application. In this thesis, by using voice packet end-to-end delay performance metric an approach is made to estimate the minimum number of VoIP calls that can be maintained, in MPLS and conventional IP networks with acceptable quality. This approach can help the network operators or designers to determine the number of VoIP calls that can be maintained for a given network by imitating the real network on the OPNET simulator. / 0046737675303
|
13 |
Internetinės telefonijos teisinis reglamentavimas Lietuvoje / Legal reglamentation of VoIP telephony in LithuaniaSvešnikova, Anastasija 04 February 2009 (has links)
Šio darbo tema - Internetinės telefonijos teisinis reglamentavimas Lietuvoje. Šiuolaikinis Internetinės telefonijos populiarumas ne tik sukelia vartotojų, bet ir reguliuotojų suinteresuotumą. Būtent ji pastaruoju metu kelia daugybę diskusijų tarptautiniuose bei nacionalinėse forumuose, kurių vienas pagrindinių aspektų – tinkamo Internetinės telefonijos reguliavimo sukūrimas. Pagrindinis baigiamojo magistrinio darbo tikslas – išnagrinėti Internetinės telefonijos reguliavimą tarptautiniu ir Lietuvos mastu, bei apžvelgti su juo susijusias problemas. Darbe nagrinėjama užsienio šalių praktika, remiantis kuria iškeliamos pagrindinės Lietuvos IP telefonijos teisinio reguliavimo gairės. Būtent: telefono numerių skyrimas, numerio perkeliamumas, skambučiai į pagalbos tarnybas, skambučiai kitais telefono numeriais, IP telefonijos skambučių saugumas, bei aprašomos su jų įgyvendinimu susijusios problemos. / The topic of the paper is Legal Reglamentation of VoIP Telephony in Lithuania. VoIP telephony’s nowadays spread and popularity scores an interest and debates not only between it’s consumers but also between legal regulators. VoIP is the main and rather often discussed topic of international and national forums, which aim to develop its proper regulation. The main aim of this paper is to internationally analyse VoIP’s legal regulation and to survey its associated problems. Foreign countries’ experience helps to formulate basic guidelines of Lithuanian VoIP legal regulation. Namely: numbering, numbers portability, calls to emergency services, calls to other telephone numbers, safety of VoIP calls and its associated problems.
|
14 |
Návrh virtuální lokální počítačové sítě pro edukativní účely / Design of a virtual local computer network for educational purposesJanošík, Martin January 2008 (has links)
The master’s thesis focuses on the virtual local computer network for laboratory usage. It aims to propose and realize proper network connection in order to monitor expected data flow. Thanks to the network analysers (software ClearSight and hardware NetTool Series II) it plans to pursue in detail the used transmission protocols of TCP/IP layers. The most decisive feature happens to be the right choice of appropriate network components and their precise configuration. Consequently, the thesis formulates a proposal of a laboratory task for the needs of students, which is also closely related to the actual problems. The assignment of the task will serve the teachers as a test pattern for measurement. The results elaborated in the form of the model protocol should enable later comparison of the recorded data. Another part of the diploma thesis is the working-out of well arranged manuals for the network analysers involved.
|
15 |
ICT and SMEs’ competitiveness in South Africa : how SMEs could use ICT to become competitive in South AfricaModimogale, Lloyd 27 August 2008 (has links)
This mini-dissertation reviews present literature to define ICT and SMEs and determine the current situation in South Africa with regard to the use of ICT by SMEs, including possible benefits to SMEs as well as stumbling blocks to adopting ICT. The research consists of collecting data from ten SMEs in Gauteng in South Africa using questionnaires and interviews, to determine how SMEs can use ICT to become more competitive. The mini-dissertation will have a number of chapters: the first chapter will give an overview of the subject. The second chapter will explain the research motivation and methodology while the third chapter will be the literature review, which will explore the topic of ICT and SMEs in depth, with a focus on South Africa. Chapter four will deal with data collection and analysis; the main source of data will be interviews based on structured questions. The fifth chapter will be the discussion and recommendations based on the results of the analysis and the literature review. Chapter Six will be the conclusion. / Dissertation (MIT)--University of Pretoria, 2008. / Informatics / unrestricted
|
Page generated in 0.1129 seconds