Ultra-Low Latency (ULL) Networks: the IEEE TSN and IETF Detnet Standards and Related 5G ULL Research Ahmed Nasrallah, Akhilesh S

Total Page:16

File Type:pdf, Size:1020Kb

Ultra-Low Latency (ULL) Networks: the IEEE TSN and IETF Detnet Standards and Related 5G ULL Research Ahmed Nasrallah, Akhilesh S 1 Ultra-Low Latency (ULL) Networks: The IEEE TSN and IETF DetNet Standards and Related 5G ULL Research Ahmed Nasrallah, Akhilesh S. Thyagaturu, Ziyad Alharbi, Cuixiang Wang, Xing Shao, Martin Reisslein, and Hesham ElBakoury Abstract—Many network applications, e.g., industrial control, tactile Internet [2], [3], and on the order of 100 microsec- demand Ultra-Low Latency (ULL). However, traditional packet onds for the one-way fronthaul in wireless cellular networks. networks can only reduce the end-to-end latencies to the order of For example, critical healthcare applications, e.g., for tele- tens of milliseconds. The IEEE 802.1 Time Sensitive Networking (TSN) standard and related research studies have sought to surgery, and transportation applications [4] require near real- provide link layer support for ULL networking, while the time connectivity. Throughput requirements largely dependent emerging IETF Deterministic Networking (DetNet) standards on the application needs, which may vary widely from small seek to provide the complementary network layer ULL support. amounts of IoT data to large exchanges of media data transfers This article provides an up-to-date comprehensive survey of the to and from the cloud (or the fog to reduce latency) [5]. IEEE TSN and IETF DetNet standards and the related research studies. The survey of these standards and research studies is Additionally, autonomous automotive vehicles [6], augmented organized according to the main categories of flow concept, and virtual reality (AR/VR), as well as robotic applications, flow synchronization, flow management, flow control, and flow which are essential for Industrial IoT (IIoT), may require both integrity. ULL networking mechanisms play a critical role in high data rates as well as ULL [7]–[10]. The high data rates the emerging fifth generation (5G) network access chain from may be required for transporting video feeds from cameras wireless devices via access, backhaul, and core networks. We survey the studies that specifically target the support of ULL in that are used to control vehicles and robots [11]. Therefore, in 5G networks, with the main categories of fronthaul, backhaul, such heterogeneous environments and applications, a dedicated and network management. Throughout, we identify the pitfalls mechanism to universally accommodate a diverse range of and limitations of the existing standards and research studies. ULL requirements would be very helpful [12]. This survey can thus serve as a basis for the development of standards enhancements and future ULL research studies that address the identified pitfalls and limitations. B. Contributions and Organization of this Survey Index Terms—Deterministic networking (DetNet), Preemption, This article provides a comprehensive up-to-date survey of Time-sensitive networking (TSN), Time synchronization, Ultra- low delay. standards and research studies addressing networking mecha- nisms for ULL applications. Section III covers the IEEE TSN standards that have grown out of the AVB standards and focus I. INTRODUCTION primarily on the link layer, while Section IV covers the ULL A. Motivation research studies related to TSN. Section V covers the Internet Traditional networks which provide end-to-end connectivity Engineering Task Force (IETF) Deterministic Networking to the users have only been successful in reducing the operat- (DetNet) standards developments, while Section VI covers ing end-to-end latencies to the order of tens of milliseconds. the ULL research studies related to DetNet. This sequence arXiv:1803.07673v3 [cs.NI] 24 Sep 2018 However, present and future applications demand Ultra-Low of the section on standards followed by the section on related Latency (ULL). For instance, the end-to-end latencies should research studies is inspired by the temporal sequence of the be on the order of a few microseconds to a few milliseconds development of the ULL field, where standard development for industrial applications [1], around 1 millisecond for the has typically preceded research studies. A large portion of the ULL applications will likely involve Please direct correspondence to M. Reisslein. A. Nasrallah, A.S. Thyagaturu, Z. Alharbi, and M. Reisslein are with the wireless communications, whereby the fifth generation (5G) School of Electrical, Computer, and Energy Eng., Arizona State University, wireless systems will play a prominent role. In particular, Tempe, AZ 85287-5706, USA, Phone: 480-965-8593, Fax: 480-965-8325, (e- the emerging tactile Internet paradigm with end-to-end target mail: fahnasral, athyagat, zalharbi, [email protected]). C. Wang and X. Shao are with the Dept. of Internet of Things latencies below 1 ms is tightly coupled to the ongoing 5G Eng., Yancheng Inst. of Techn., Yancheng, Jiangsu Province, P.R. China (e- developments [5], [13]–[16]. The support of 5G wireless ULL mail: [email protected], [email protected]). C. Wang and X. Shao visited communications services will likely heavily rely on the TSN Arizona State Univ., Tempe, while contributing to this study. C. Wang was supported by the Overseas Training Program of the Yancheng Institute of and DetNet standards and research results. On the other hand, Technology. X. Shao was supported by a Jiangsu Provincial Government due to prevalence and importance of wireless communications Scholarship for Overseas Learning. in today’s society, the particular 5G wireless context and H. ElBakoury is with Futurewei Technologies Inc., 2330 Central Expressway, Santa Clara, CA, 95050, USA (e-mail: requirements will likely influence the future development of [email protected]). ULL standards development and research. We believe that for 2 a thorough understanding of the complete ULL research area II. BACKGROUND it is vital to comprehensively consider the ULL standards, A. Latency Terminology namely TSN and DetNet, as well as a main “application domain” of ULL standards and research results. We anticipate Generally, latency refers to the total end-to-end packet delay that 5G wireless communications will emerge as a highly from the instant of the beginning of transmission by the sender important application domain of ULL standards and research (talker) to the complete reception by the receiver (listener). results and we therefore survey ULL related standards and The term ultra-low latency (ULL) commonly refers to latencies research studies for 5G wireless systems in Section VII. that are very short, e.g., on the order of a few milliseconds or Section VIII identifies the main gaps and limitation of the less than one millisecond. ULL applications often require de- existing TSN and DetNet standards as well as ULL related terministic latency, i.e., all frames of a given application traffic 5G standards and research studies and outlines future research flow (connection) must not exceed a prescribed bound [44], directions to address these gaps and limitations. e.g., to ensure the proper functioning of industrial automation systems. It is also possible that applications may require probabilistic latency, i.e., a prescribed delay bound should be met with high probability, e.g., for multimedia streaming C. Related Literature systems [45], [46], where rare delay bound violations have negligible impact of the perceived quality of the multimedia. While to the best of our knowledge there is no prior survey Latency jitter, or jitter for short, refers to the packet latency on time sensitive networking (TSN), there are prior surveys on variations. Often ULL systems require very low jitter. Latency topics that relate to TSN. We proceed to review these related and jitter are the two main quality of service (QoS) metrics surveys and differentiate them from our survey. for ULL networking. We note that there are a wide range of A survey on general techniques for reducing latencies in ULL applications with vastly different QoS requirements, see Internet Protocol (IP) packet networks has been presented Table I. For instance, some industrial control applications have in [17]. The survey [17] gave a broad overview of the very tight delay bounds, e.g., only a few microseconds, while sources of latencies in IP networks and techniques for latency other industrial control applications have more relaxed delay reduction that have appeared in publications up to August bounds up to a millisecond. 2014. The range of considered latency sources included the network structure, e.g., aspects of content placement and service architectures, the end point interactions, e.g., aspects of B. IEEE 802.1 Overview transport initialization and secure session initialization, as well Before we delve into the standardization efforts of the as the delays inside end hosts, e.g., operating system delays. IEEE Time-Sensitive Network (TSN) Task Group (TG), we In contrast, we provide an up-to-date survey of the IEEE Time briefly explain the organizational structure of the IEEE 802.1 Sensitive Networking (TSN) standard for the link layer and the Working Group (WG). The 802.1 WG is chartered to develop Deterministic Networking (DetNet) standard for the network and maintain standards and recommended practices in the layer, and related research studies. Thus, in brief, whereas the following areas: 1) 802 LAN/MAN architecture, 2) inter- survey [17] broadly covered all latency sources up to 2014, networking among 802 LANs, MANs, and other wide area we comprehensively cover the link and network layer latency networks, 3) security, 4) 802 overall network management, and reduction standards and studies up to July 2018. 5) protocol layers above the MAC and LLC layers. Currently, A few surveys have examined specific protocol aspects that there are four active task groups in this WG: 1) Time Sensitive relate to latency, e.g., time synchronization protocols have Networking, 2) Security, 3) Data Center Bridging, and 4) been surveyed in [18], [19], routing protocols have been OmniRAN. surveyed in [20]–[22], while congestion control protocols have The main IEEE 802.1 standard that has been continuously been covered in [23], [24]. Several surveys have covered revised and updated over the years is IEEE 802.1Q-2014 [58], latency reduction through mobile edge and fog computing, formally known as the IEEE 802.1D standard.
Recommended publications
  • Time-Synchronized Data Collection in Smart Grids Through Ipv6 Over
    Time-synchronized Data Collection in Smart Grids through IPv6 over BLE Stanley Nwabuona Markus Schuss Simon Mayer Pro2Future GmbH Graz University of Technology Pro2Future GmbH and Graz Graz, Austria Graz, Austria University of Technology [email protected] [email protected] Graz, Austria [email protected] Konrad Diwold Lukas Krammer Alfred Einfalt Siemens Corporate Siemens Corporate Siemens Corporate Technology Technology Technology Vienna, Austria Vienna, Austria Vienna, Austria [email protected] [email protected] [email protected] ABSTRACT INTRODUCTION For the operation of electrical distribution system an increased Due to the progressing integration of distributed energy re- shift towards smart grid operation can be observed. This shift sources (such as domestic photovoltaics) into the distribution provides operators with a high level of reliability and efficiency grid [5], conventional – mostly passive – monitoring and con- when dealing with highly dynamic distribution grids. Techni- trol schemes of power systems are no longer applicable. This cally, this implies that the support for a bidirectional flow of is because these are not designed to handle and manage the data is critical to realizing smart grid operation, culminating in volatile and dynamic behavior stemming from these new active the demand for equipping grid entities (such as sensors) with grid entities. Therefore, advanced controlling and monitoring communication and processing capabilities. Unfortunately, schemes are required for distribution grid operation (i.e., in- the retrofitting of brown-field electric substations in distribu- cluding in Low-Voltage (LV) grids) to avoid system overload tion grids with these capabilities is not straightforward – this which could incur permanent damages.
    [Show full text]
  • Your Performance Task Summary Explanation
    Lab Report: 13.3.4 Configure Remote Wipe Your Performance Your Score: 0 of 1 (0%) Pass Status: Not Passed Elapsed Time: 17 seconds Required Score: 100% Task Summary Actions you were required to perform: In Remotely wipe Maggie's iPad Explanation In this lab, your task is to assist Maggie with a remote wipe as follows: Log in to icloud.com using the following credentials: Apple ID: [email protected] Password: maggieB123 Using Find iPhone, select her iPad and erase it. Enter a phone number and message to be displayed on the iPad. Complete this lab as follows: 1. In the URL field in Chrome, enter icloud.com and press Enter. 2. Maximize the window for easier viewing. 3. In the Sign in to iCloud field, enter [email protected] and press Enter. 4. Enter maggieB123 and press Enter. 5. Select Find iPhone. 6. Select All Devices. 7. Select Maggie's iPad. 8. Select Erase iPad. 9. Select Erase. 10. In the Enter AppleID to continue field, enter [email protected] and press Enter. 11. Enter maggieB123 and press Enter. 12. In the Number field, enter a phone number of your choosing to be displayed on the iPad. 13. Click Next. 14. Enter a message of your choosing to be displayed on the iPad. 15. Click Done. 16. Click OK. Lab Report: 13.3.6 Require a Screen Saver Password Your Performance Your Score: 0 of 3 (0%) Pass Status: Not Passed Elapsed Time: 8 seconds Required Score: 100% Task Summary Actions you were required to perform: In Enable the screen saver In Enable the screen saver after 10 minutes In Show the logon screen when the computer wakes Explanation In this lab, your task is to complete the following: Enable the screen saver (you choose the screen saver type to use).
    [Show full text]
  • Ethernet Alliance Hosts Third IEEE 802.1 Data Center Bridging
    MEDIA ALERT Ethernet Alliance® Hosts Third IEEE 802.1 Data Center Bridging Interoperability Test Event Participation is Open to Both Ethernet Alliance Members and Non‐Members WHAT: The Ethernet Alliance Ethernet in the Data Center Subcommittee has announced it will host an IEEE 802.1 Data Center Bridging (DCB) interoperability test event the week of May 23 in Durham, NH at the University of New Hampshire Interoperability Lab. The Ethernet Alliance invites both members and non‐members to participate in this third DCB test event that will include both protocol and applications testing. The event targets interoperability testing of Ethernet standards being developed by IEEE 802.1 DCB task force to address network convergence issues. Testing of protocols will include projects such as IEEE P802.1Qbb Priority Flow Control (PFC), IEEE P802.1Qaz Enhanced Transmission Selection (ETS) and DCB Capability Exchange Protocol (DCBX). The test event will include testing across a broad vendor community and will exercise DCB features across multiple platforms as well as exercise higher layer protocols such as Fibre Channel over Ethernet (FCoE), iSCSI over DCB, RDMA over Converged Ethernet (RoCE) and other latency sensitive applications. WHY: These test events help vendors create interoperable, market‐ready products that interoperate to the IEEE 802.1 DCB standards. WHEN: Conference Call for Interested Participants: Friday, March 4 at 10 AM PST Event Registration Open Until: March 4, 2011 Event Dates (tentative): May 23‐27, 2011 WHERE: University of New Hampshire Interoperability Lab (UNH‐IOL) Durham, NH WHO: The DCB Interoperability Event is hosted by the Ethernet Alliance. REGISTER: To get more information, learn about participation fees and/or register for the DCB plugfest, please visit Ethernet Alliance DCB Interoperability Test Event page or contact [email protected].
    [Show full text]
  • Ieee 802.1 for Homenet
    IEEE802.org/1 IEEE 802.1 FOR HOMENET March 14, 2013 IEEE 802.1 for Homenet 2 Authors IEEE 802.1 for Homenet 3 IEEE 802.1 Task Groups • Interworking (IWK, Stephen Haddock) • Internetworking among 802 LANs, MANs and other wide area networks • Time Sensitive Networks (TSN, Michael David Johas Teener) • Formerly called Audio Video Bridging (AVB) Task Group • Time-synchronized low latency streaming services through IEEE 802 networks • Data Center Bridging (DCB, Pat Thaler) • Enhancements to existing 802.1 bridge specifications to satisfy the requirements of protocols and applications in the data center, e.g. • Security (Mick Seaman) • Maintenance (Glenn Parsons) IEEE 802.1 for Homenet 4 Basic Principles • MAC addresses are “identifier” addresses, not “location” addresses • This is a major Layer 2 value, not a defect! • Bridge forwarding is based on • Destination MAC • VLAN ID (VID) • Frame filtering for only forwarding to proper outbound ports(s) • Frame is forwarded to every port (except for reception port) within the frame's VLAN if it is not known where to send it • Filter (unnecessary) ports if it is known where to send the frame (e.g. frame is only forwarded towards the destination) • Quality of Service (QoS) is implemented after the forwarding decision based on • Priority • Drop Eligibility • Time IEEE 802.1 for Homenet 5 Data Plane Today • 802.1Q today is 802.Q-2011 (Revision 2013 is ongoing) • Note that if the year is not given in the name of the standard, then it refers to the latest revision, e.g. today 802.1Q = 802.1Q-2011 and 802.1D
    [Show full text]
  • Data Center Ethernet 2
    DataData CenterCenter EthernetEthernet Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at: http://www.cse.wustl.edu/~jain/cse570-15/ Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-15/ ©2015 Raj Jain 4-1 OverviewOverview 1. Residential vs. Data Center Ethernet 2. Review of Ethernet Addresses, devices, speeds, algorithms 3. Enhancements to Spanning Tree Protocol 4. Virtual LANs 5. Data Center Bridging Extensions Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-15/ ©2015 Raj Jain 4-2 Quiz:Quiz: TrueTrue oror False?False? Which of the following statements are generally true? T F p p Ethernet is a local area network (Local < 2km) p p Token ring, Token Bus, and CSMA/CD are the three most common LAN access methods. p p Ethernet uses CSMA/CD. p p Ethernet bridges use spanning tree for packet forwarding. p p Ethernet frames are 1518 bytes. p p Ethernet does not provide any delay guarantees. p p Ethernet has no congestion control. p p Ethernet has strict priorities. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-15/ ©2015 Raj Jain 4-3 ResidentialResidential vs.vs. DataData CenterCenter EthernetEthernet Residential Data Center Distance: up to 200m r No limit Scale: Few MAC addresses r Millions of MAC Addresses 4096 VLANs r Millions of VLANs Q-in-Q Protection: Spanning tree r Rapid spanning tree, … (Gives 1s, need 50ms) Path determined by r Traffic engineered path spanning tree Simple service r Service Level Agreement.
    [Show full text]
  • MPLS-Based Metro Ethernet Networks a Tutorial • Paresh Khatri • 2018
    MPLS-based Metro Ethernet Networks A tutorial • Paresh Khatri • 2018 1 © Nokia 2017 Public Agenda 1. Introduction 2. Introduction to Metro Ethernet Services 3. Traditional Metro Ethernet networks 4. Delivering Ethernet over MPLS 5. Summary 6. Questions 2 © Nokia 2017 Public introduction 3 © Nokia 2017 Public Introduction • Paresh Khatri ([email protected]) - Chief Architect – IP Routing & Transport APAC, Alcatel-Lucent • Key focus areas: - End-to-end network architectures - SDN/NFV - Large-scale IP/MPLS networks - L2/L3 VPNs - Carrier Ethernet - Next-generation mobile backhaul networks • Acknowledgements: - Some figures and text are provided courtesy of the Metro Ethernet Forum (MEF) 4 © Nokia 2017 Public introduction to metro ethernet services 5 © Nokia 2017 Public AGenda 2. Introduction to Metro Ethernet Services a) Why Metro Ethernet ? b) Attributes of Carrier Ethernet c) Carrier Ethernet Services defined by the MEF 6 © Nokia 2017 Public 2.1 Why Metro Ethernet ? 7 © Nokia 2017 Public Introduction to Metro Ethernet Services What is Metro Ethernet ? “… generally defined as the network that bridges or connects geographically separated enterprise LANs while also connecting across the WAN or backbone networks that are generally owned by service providers. The Metro Ethernet Networks provide connectivity services across Metro geography utilising Ethernet as the core protocol and enabling broadband applications” from “Metro Ethernet Networks – A Technical Overview” from the Metro Ethernet Forum 8 © Nokia 2017 Public Introduction to Metro
    [Show full text]
  • Ipv4 WAN (Internet) Layer 2 Tunneling Protocol (L2TP) Configuration on RV120W and RV220W
    IPv4 WAN (Internet) Layer 2 Tunneling Protocol (L2TP) Configuration on RV120W and RV220W Objectives Layer 2 Tunneling Protocol (L2TP) establishes a Virtual Private Network (VPN) that allows remote hosts to connect to one another through a secure tunnel. It does not provide any encryption or confidentiality by itself but relies on an encryption protocol that it passes within the tunnel to provide privacy. One of its biggest advantages is that it encrypts the authentication process which makes it more difficult for someone to "listen in" on your transmission to intercept and crack the data. L2TP does not only provide confidentiality but also data integrity. Data integrity is protection against modification of date between the time it left the sender and the time it reached the recipient. This document explains how to configure the IPv4 WAN (Internet) for use with Layer 2 Tunneling Protocol (L2TP) on the RV120W and RV220W. Applicable Devices • RV120W • RV220W Software Version • v1.0.4.17 IPv4 WAN (Internet) L2TP Configuration Step 1. Log in to the web configuration utility and choose Networking > WAN (Internet) > IPv4 WAN(Internet). The IPv4 WAN (Internet) page opens: Step 2. Choose L2TP from the Internet Connection Type drop-down list. Step 3. Enter the username provided from ISP in the User Name field. Step 4. Enter the password provided from ISP in the password field. Step 5. (Optional) Enter the secret pass phrase if provided by the ISP in the Secret field. Step 6. Click the desired radio button for the Connection Type: • Keep Connected — This keeps the device connected to the network for all the time.
    [Show full text]
  • Telematics Chapter 3: Physical Layer
    Telematics User Server watching with video Chapter 3: Physical Layer video clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Data Link Layer Data Link Layer Data Link Layer Physical Layer Physical Layer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Computer Systems and Telematics (CST) Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Theoretical Basis for Data Communication ● Analog Data and Digital Signals ● Data Encoding ● Transmission Media ● Guided Transmission Media ● Wireless Transmission (see Mobile Communications) ● The Last Mile Problem ● Multiplexing ● Integrated Services Digital Network (ISDN) ● Digital Subscriber Line (DSL) ● Mobile Telephone System Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.3 Design Issues ● Connection parameters ● mechanical OSI Reference Model ● electric and electronic Application Layer ● functional and procedural Presentation Layer ● More detailed ● Physical transmission medium (copper cable, Session Layer optical fiber, radio, ...) ● Pin usage in network connectors Transport Layer ● Representation of raw bits (code, voltage,…) Network Layer ● Data rate ● Control of bit flow: Data Link Layer ● serial or parallel transmission of bits Physical Layer ● synchronous or asynchronous transmission ● simplex, half-duplex, or full-duplex transmission mode Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 3: Physical Layer 3.4 Design Issues Transmitter Receiver Source Transmission System Destination NIC NIC Input Abcdef djasdja dak jd ashda kshd akjsd asdkjhasjd as kdjh askjda Univ.-Prof.
    [Show full text]
  • Implementing an IEEE 1588 V2 on I.MX RT Using Ptpd, Freertos, and Lwip TCP/IP Stack
    NXP Semiconductors Document Number: AN12149 Application Note Rev. 1 , 09/2018 Implementing an IEEE 1588 V2 on i.MX RT Using PTPd, FreeRTOS, and lwIP TCP/IP stack 1. Introduction Contents This application note describes the implementation of 1. Introduction .........................................................................1 the IEEE 1588 V2 Precision Time Protocol (PTP) on 2. IEEE 1588 basic overview ..................................................2 2.1. Synchronization principle ........................................ 3 the i.MX RT MCUs running FreeRTOS OS. The IEEE 2.2. Timestamping ........................................................... 5 1588 standard provides accurate clock synchronization 3. IEEE 1588 functions on i.MX RT .......................................6 for distributed control nodes in industrial automation 3.1. Adjustable timer module .......................................... 6 3.2. Transmit timestamping ............................................. 8 applications. 3.3. Receive timestamping .............................................. 8 3.4. Time synchronization ............................................... 8 The implementation runs on the i.MX RT10xx 3.5. Input capture and output compare block .................. 8 Evaluation Kit (EVK) board with i.MX RT10xx MCUs. 4. IEEE 1588 implementation for i.MX RT ............................9 The demo software is based on the NXP MCUXpresso 4.1. Hardware components .............................................. 9 4.2. Software components ............................................
    [Show full text]
  • Preface Towards the Reality of Petabit Networks
    Preface Towards the Reality of Petabit Networks Yukou Mochida Member of the Board Fujitsu Laboratories Ltd. The telecommunications world is shifting drastically from voice oriented telephone networks to data oriented multimedia networks based on the Internet protocol (IP). Telecommunication carriers are positively extending their service attributes to new applications, and suppliers are changing their business areas and models, conforming to the radical market changes. The Internet, which was originally developed for correspondence among researchers, has evolved into a global communi- cations platform. Improvements in security technology are encouraging businesses to integrate the Internet into their intranets, and the eco- nomic world and basic life styles are being changed by the many new Internet-based services, for example, electronic commerce (EC), that have become available. This revolutionary change in telecommunications seems to come mainly from three motive forces. The first is the information society that has come into being with the wide and rapid deployment of person- al computers and mobile communications. The second is the worldwide deregulation and the resulting competitive telecommunications envi- ronment, which facilitates active investment in the growing market to construct huge-capacity networks for exploding traffic. The third is photonic networks based on wavelength division multiplexing (WDM) technology, which can greatly increase the communication capacity and drastically decrease the transmission cost per channel. Photonic net- works are attractive because they can also radically improve node throughput and offer transparency and flexibility while accommodating different signal formats and protocols, expandability for cost-effective gradual deployment, and high reliability, which is strongly required for a secure information society.
    [Show full text]
  • Navigating Network Migration Challenges: Upgrade Your 1GE
    Navigating Network Migration Challenges: Upgrade Your 1GE Metro Ethernet Access Network to 10GE A White Paper from Telco Systems Upgrade Your 1GE Metro Ethernet Access Network to 10GE | 2 Intoduction Many businesses and service providers are migrating from • Service providers are finding it more difficult to live up to 1GE to 10GE networks as they attempt to avoid the obstacles their customers’ service level agreements (SLA) to presented by heavy bandwidth, while leveraging the benefits provide multiple services, which require more bandwidth that 10GE networking has to offer. The requirement for • Generating more revenue within the current limits of a more bandwidth has become a constant battle. As internet 1Gig network usage continues to increase with the popularity of data and streaming services, so does the demand for more bandwidth. As the gap between service revenues and the demand for From education (homework, e-learning, campus networks), higher bandwidth grows, providers are looking for ways to finance (online banking, stock trading, bill pay), and business better control their expenses while offering higher bandwidth purposes (company intranets, remote workers), to social media and more services to more customers. With the increasing (Facebook, Instagram, Twitter, Snapchat), political (campaigns demand for more bandwidth with OTT (over-the-top) and outreach) and personal purposes, data requirements applications like video streaming, Hulu, Netflix, and Amazon continue to rise – quicker than service providers can react. Prime becoming more popular, 1GE networks aren’t going to cut it anymore. In support of these activities, service providers are being driven to enhance their network capacities in their business Ethernet, To conquer these challenges, enterprises and service mobile backhaul, E-Rate, cloud networking, and SDN & NFV providers are migrating their 1GE networks to 10GE.
    [Show full text]
  • Publication Title 1-1962
    publication_title print_identifier online_identifier publisher_name date_monograph_published_print 1-1962 - AIEE General Principles Upon Which Temperature 978-1-5044-0149-4 IEEE 1962 Limits Are Based in the rating of Electric Equipment 1-1969 - IEEE General Priniciples for Temperature Limits in the 978-1-5044-0150-0 IEEE 1968 Rating of Electric Equipment 1-1986 - IEEE Standard General Principles for Temperature Limits in the Rating of Electric Equipment and for the 978-0-7381-2985-3 IEEE 1986 Evaluation of Electrical Insulation 1-2000 - IEEE Recommended Practice - General Principles for Temperature Limits in the Rating of Electrical Equipment and 978-0-7381-2717-0 IEEE 2001 for the Evaluation of Electrical Insulation 100-2000 - The Authoritative Dictionary of IEEE Standards 978-0-7381-2601-2 IEEE 2000 Terms, Seventh Edition 1000-1987 - An American National Standard IEEE Standard for 0-7381-4593-9 IEEE 1988 Mechanical Core Specifications for Microcomputers 1000-1987 - IEEE Standard for an 8-Bit Backplane Interface: 978-0-7381-2756-9 IEEE 1988 STEbus 1001-1988 - IEEE Guide for Interfacing Dispersed Storage and 0-7381-4134-8 IEEE 1989 Generation Facilities With Electric Utility Systems 1002-1987 - IEEE Standard Taxonomy for Software Engineering 0-7381-0399-3 IEEE 1987 Standards 1003.0-1995 - Guide to the POSIX(R) Open System 978-0-7381-3138-2 IEEE 1994 Environment (OSE) 1003.1, 2004 Edition - IEEE Standard for Information Technology - Portable Operating System Interface (POSIX(R)) - 978-0-7381-4040-7 IEEE 2004 Base Definitions 1003.1, 2013
    [Show full text]