Simulation modeling of packet switching network segment functioning

Author(s):  
D. V. Shelkovoy ◽  
A. A. Chernikov

The testing results of required channel resource mathematical estimating models for the for serving the proposed multimedia load in packet-switched communication networks are presented in the article. The assessment of the attainable level of quality of service at the level of data packet transportation was carried out by means of simulation modeling of the functioning of a switching node of a communication network. The developed modeling algorithm differs from the existing ones by taking into account the introduced delay for processing each data stream packet arriving at the switching node, depending on the size of the reserved buffer and the channel resource for its maintenance. A joint examination of the probability of packet loss and the introduced delay in the processing of data packets in the border router allows a comprehensive assessment of the quality of service «end to end», which in turn allows you to get more accurate values of the effective data transmitted rate by aggregating flows at the entrance to the transport network.

2018 ◽  
Vol 7 (2.28) ◽  
pp. 181
Author(s):  
Ali M. Al-Saegh

Building scheduling algorithms in satellite communication links became a necessity according to the typical problems that satellite networks suffers from, such as congestions, jamming, mobility, atmospheric impairment, and achieving the quality of service (QoS) requirements. However, building efficient algorithms needs several considerations that should be taken into account. Such as satellite and earth station node(s), link parameters and specifications, along with the service requirements and limitations. This paper presents efficient approach for accumulating the effective considerations that the designer should employ as a framework for building proper and efficient scheduling algorithm. The proposed approach provides proper solutions to the satellite communications impairments and satisfies the quality of service requirements in satellite communication networks.  


2020 ◽  
Vol 2 (2) ◽  
pp. 131-139
Author(s):  
Firmansyah Firmansyah ◽  
Mochamad Wahyudi ◽  
Rachmat Adi Purnama

Quality of Service in a network is a big thing that must be resolved and dealt with as best as possible. The limitation of the maximum transfer rate in network devices creates an obstacle in the process of transferring data packets. To maximize the transfer rate in network devices, you can use Virtual Link Aggregation which can offer bandwidth optimization and failover in the network. Link aggregation is a solution in combining several physical links into one logical link. The method used in this research is to consider the allocation of bandwidth, load balancing and failover in the link aggregation. From the results of the link aggregation test using two (2) interface bonding, the results of the bandwidth averages when there is a UPD data packet transfer to 0 bps / 184.9 Mbps, which was previously around 0 bps / 91.6 Mbps. While the result of the bandwidth averages when the TCP data packet transfer occurs is 0 bps / 105.5 Mbps, which was previously around 0 bps / 93.8 Mbps. Link Aggregation using a Mikrotik Router is a solution to produce a larger Throughput Bandwidth by combining two (2) Ethernet Physical Links into one logical link.


Author(s):  
Abdullah El-Haj ◽  
Shadi Aljawarneh

The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper the authors propose a Secure Data Transmission Mechanism (SDTM) with Preemption Algorithm that combines between security and quality of service. Their developed SDTM enhanced with Malicious Packets Detection System (MPDS) which is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access Cloud network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices.


2012 ◽  
Vol 35 (5) ◽  
pp. 597-607 ◽  
Author(s):  
Ramya Ramamoorthy ◽  
F. Richard Yu ◽  
Helen Tang ◽  
Peter Mason ◽  
Azzedine Boukerche

Sign in / Sign up

Export Citation Format

Share Document