Comparison Between Ipv4 and Ipv6 in Adopting Differentiated Services

Total Page:16

File Type:pdf, Size:1020Kb

Comparison Between Ipv4 and Ipv6 in Adopting Differentiated Services INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 3, ISSUE 2, FEBRUARY 2014 ISSN 2277-8616 Comparison Between Ipv4 And Ipv6 In Adopting Differentiated Services. Mohammed Al-Zobbi Abstract: IPv4 is an old protocol and suffers from addresses shortage, redundancy and other problems. IPv6 is a new protocol, which is not been widely adopted, but it supports Quality of Service (QoS) Features and a huge range of unique addresses. IPv6 needs to be tested and evaluated regarding to QoS support. The Differentiated Services “DiffServ” is a QoS framework; it could be implemented in either IPv4 or IPv6. DiffServ requires 6-bit value to be assigned to IPv4/IPv6 header; this value is called DSCP (DiffServ codepoint). DSCP is set in a “ToS” field in IPv4, and in a “Class” field in IPv6. There is no any implementation difference between assigning DSCP in either IPv4 or IPv6. In this research, a comparison between IPv4 and IPv6 in adopting DiffServ framework is presented. DiffServ represents the QoS frameworks; the impact of each version of IPs on QoS, affects the DiffServ framework, and as a result, affects the whole network performance. Index Terms: Adopting DiffServ, CodePoint in DeiffServ, Comparison between IPv4 and Ipv6, DiffServ and QoS, IPv4 and IPv6, IPv6 and QoS, Network protocol ———————————————————— 1. INTRODUCTION Gai (1998) replays that the use of subnets can increase the The problem of the limited IPv4 addresses could be solved efficiency of the network to a certain level. In fact, users or in different alternative technologies such as: subnetting, organizations may abuse the IP addresses system, by Network Addresses Translation (NAT), or Classless Inter- purchasing class B addresses, while the used addresses Domain Routing (CIDR). However, with NAT, the external are not more than 100. In this case, more than 65,500 people see the entire subnet as one computer, and this addresses are potentially wasted. However, Loshin (1999) inherits problems [26]. IP addresses might be solved for a claims that it’s not only the user’s fault, but also the nature while, but they will no longer be able to handle the fast of IP addresses is a waste, because organizations have to growth of Internet. Moreover, some more problems are buy their IP for no more than one or two terminals; this hardly to be solved relating to the current structure of IPv4. means tying up 254 host addresses. The subnetting causes More problems are discussed in the following sections. IP addresses wastage of resources. The size of the Routers need to lookup the longest match in the organization should match the chosen IP class, and this conventional IP routing list; routers then decide the right rarely happens. path to send the datagram through [6]. The limited amount of network would cause any delay problem for the routers; 2. IPV6 in fact, the computer networks are increasing continuously, IPv6 addresses are 128 bits long or 16 octets. IPv6 which could reach to a level of causing a serious delay for addresses are four times longer than IPv4 addresses. The the routed data. In such case, the future network may hexadecimal system is used to assign the addresses, witness more delay in the network. This routing issue instead of the decimal system in IPv4. Eight groups of affects the performance of the networks, and as a result it numbers, separated by a colon (:), are used, each group affects the Internet’s growth [6]. Subnetting is a technique contains pair of hexadecimal numbers, for example: used to save the IP addresses by assigning as much addresses as possible [3]. Three main classes of addresses FEDC: BA88:45DF:9810:0008:417A:0000:0FB6 are available, these are A,B and C. Class A provides 3 empty digits of addresses, e.g. 122.x.x.x. While Class B In this example, we can see the difficulties of remembering provides 2 empty digits of addresses, e.g. 122.211.x.x. and or managing these addresses. This explains the need for Class C provides 1 empty digit of addresses, e.g. DHCP and DNS servers, in order to assign these 122.211.101.x. By subnetting, a class A, B, or C network addresses automatically. A new version of DHCPv6 is addresses can be divided into different subnets. Each designed to provide auto configuration to client-server subnet is used to identify a branch of the organizations [3]. nodes [4]. Compression methods or shortcuts can be applied to IPv6 addresses by neglecting zeros; for example, we can type 0 instead of 0000, or 20 instead of 0020 [4]. More compression can be applied, by replacing (:) by a series of zeros: as an example: the address 0050:0:0:0:0:0:0:CA2B could be re-written as 50: :CA2B. Some reserved addresses use the principle of shortcut, such as: multicasting: FF01: :43, loop back address : :1, ________________________________ and unspecified address : : [9]. The author has completed a master degree in 2.1 IPv6 Extension Header Computing, from the University of Western Sydney / IPv4 header contains an option header, while IPv6 assigns Australia. This research was supervised by Dr. the options in separateextension headers. This design Seyed Shahrestani. Author improves the routers performances; the routers don’t need email: [email protected] to examine extra fields, especially if they were unused. The extension header is almost 64-bit size, and they can’t be 237 IJSTR©2014 www.ijstr.org INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 3, ISSUE 2, FEBRUARY 2014 ISSN 2277-8616 empty; they are used only on demand. Figure (2.3), relative performance (such as class differentiation). It first illustrates an extension headers examples [1]. The assigns bits to IP header, and then it uses these bits to extension headers are processed in the order they appear determine how packets are forwarded, and finally uses the in the packet [4], RFC 1883 recommends that these marked packet to force QoS policies and conditions at the headers appear as the following: IPv6 header, Hop-by-Hop network boundaries [12]. The PHB provides different option header, Destination Options headers, Routing treatments to the network traffic. DiffServ requires headers, Fragment header, Authentication header, monitoring, policing, and shaping in order to investigate the Encapsulating Security Payload header, Destination satisfaction for the QoS. Traffic analysis and statistical header, Upper header [4,23]. The Hop-by-Hop and calculation are essential processes to provide the satisfied Destination extension header are encoded by using TLV configuration for PHB. Some difficulties may face the PHB format. Hop-by-Hop extension header handles the extra- configuration as a reason of non-standardizing the PHB large IP packets, which is over 65,535 bytes; routers are configuration, and the non-fully understanding of traffic unable to handle such these jumbo packets. In IPv6, these rules and polices. Figure (3.1) shows DiffServ diagram. The packets are discarded without adding the Hop-by-Hop DS size is 8-bit divided into two fields; the first field is called optional extension header. Figure (2.4) shows the format of DiffServ Codepoint (DSCP), the field size is six-bit used to option header in TLV format [23]. identify the packet. The second field size is two-bit Currently Unused (CU). IPv6 Header Next Header TCP PDU =TCP IPv6 Header Routing Header Next Header Next Header= TCP TCP PDU Figure (3.1), shows DiffServ classification source [20] =Routing The unused field should be ignored, while the six-bit field IPv6 Header Routing Header Fragment Header can be set as (0,1). There is no standard to assign values, Next Header Next Header = Next Header=TCP TCP PDU implementers should be aware of six-bit field to create their =Routing Fragment own table of index, which is used to select a particular packet handling mechanism. The particular codepoint is selected by the following the format “xxx000” or DiffServ is Figure (2.3), Extension Header Source [4] selected as “xxx000|xx”. This packet marking is done on the edge routers, the edge routers examines the packet, and then decides the suitable codepoint to that packet based on Option Type Option Data Length Option Data the table of index. The core router doesn’t need to assign any marks, it only reads the codepoint and decides the 2 1 5 class selector PHB based on it. A default BHP “000000” is used to enable the delivery of packets without any strict conditions or rules. The packet marked with a default BHP Figure (2.4), TLV options may be re-marked again with another codepoint as it passes the boundary to another domain. Figure (2.4) shows three fields in the extension header, these fields are divided as the following: IPv6 header 3.1 DiffServ and Tunneling notifies the optional header by using the next-header field, The main principle, of DiffServ tunneling configuration, is for example; Hop-by-Hop option header is notified by (0), setting the inner and outer DSCP properly to avoid and fragment option is notified by (44) [3]. The Jumbo transmission faults. Six different statuses are defined for Payload Option is essential to the packets that exceed the encapsulation and decapsulation processes, these statuses 65,535 bytes. The Payload Length field in IPv6 header are shown in figure (3.3). The diagram shows [1-before] assigns 16 bits only, while the Jumbo Payload option means the packet before encapsulation, [2-inner] means assigns (4n + 2), whereas n: any Integer. However, the the inner packet is encapsulated, [3-outer] means the outer maximum limit of data is 4,294,967,295 octets [23]. The packet is encapsulated, [4-inner], and [5-outer] mean the Jumbo Payload Option is included in Hop-by-Hop option inner and the outer packets are decapsulated, while [6- header, the Option Type value = 194, and the Option Data after] is the packet after decapsulation.
Recommended publications
  • Diffserv -- the Scalable End-To-End Qos Model
    WHITE PAPER DIFFSERV—THE SCALABLE END-TO-END QUALITY OF SERVICE MODEL Last Updated: August 2005 The Internet is changing every aspect of our lives—business, entertainment, education, and more. Businesses use the Internet and Web-related technologies to establish Intranets and Extranets that help streamline business processes and develop new business models. Behind all this success is the underlying fabric of the Internet: the Internet Protocol (IP). IP was designed to provide best-effort service for delivery of data packets and to run across virtually any network transmission media and system platform. The increasing popularity of IP has shifted the paradigm from “IP over everything,” to “everything over IP.” In order to manage the multitude of applications such as streaming video, Voice over IP (VoIP), e-commerce, Enterprise Resource Planning (ERP), and others, a network requires Quality of Service (QoS) in addition to best-effort service. Different applications have varying needs for delay, delay variation (jitter), bandwidth, packet loss, and availability. These parameters form the basis of QoS. The IP network should be designed to provide the requisite QoS to applications. For example, VoIP requires very low jitter, a one-way delay in the order of 150 milliseconds and guaranteed bandwidth in the range of 8Kbps -> 64Kbps, dependent on the codec used. In another example, a file transfer application, based on ftp, does not suffer from jitter, while packet loss will be highly detrimental to the throughput. To facilitate true end-to-end QoS on an IP-network, the Internet Engineering Task Force (IETF) has defined two models: Integrated Services (IntServ) and Differentiated Services (DiffServ).
    [Show full text]
  • Autoqos for Voice Over IP (Voip)
    WHITE PAPER AUTOQoS FOR VOICE OVER IP Last Updated: September 2008 Customer networks exist to service application requirements and end users efficiently. The tremendous growth of the Internet and corporate intranets, the wide variety of new bandwidth-hungry applications, and convergence of data, voice, and video traffic over consolidated IP infrastructures has had a major impact on the ability of networks to provide predictable, measurable, and guaranteed services to these applications. Achieving the required Quality of Service (QoS) through the proper management of network delays, bandwidth requirements, and packet loss parameters, while maintaining simplicity, scalability, and manageability of the network is the fundamental solution to running an infrastructure that serves business applications end-to-end. Cisco IOS ® Software offers a portfolio of QoS features that enable customer networks to address voice, video, and data application requirements, and are extensively deployed by numerous Enterprises and Service Provider networks today. Cisco AutoQoS dramatically simplifies QoS deployment by automating Cisco IOS QoS features for voice traffic in a consistent manner and leveraging the advanced functionality and intelligence of Cisco IOS Software. Figure 1 illustrates how Cisco AutoQoS provides the user a simple, intelligent Command Line Interface (CLI) for enabling campus LAN and WAN QoS for Voice over IP (VoIP) on Cisco switches and routers. The network administrator does not need to possess extensive knowledge of the underlying network
    [Show full text]
  • AES67-101: the Basics of AES67
    AES67-101: The Basics of AES67 Anthony P. Kuzub IP Audio Product Manager [email protected] www.Ward-Beck.Systems TorontoAES.org Vice-Chair Ward-Beck.Systems - Audio Domains PREAMPS.audio FILTERING.audio PATCHING.audio MUTING.audio DB25.audio VUMETERS.audio PANELS.audio MATRIXING.audio BUSSING.audio XLR.audio SUMMING.audio AMPLIFY.audio CONSOLES.audio GROUNDING.audio The least you SHOULD know about networking: The physical datalink networks transported sessions presented by the application TX RX DATA 7 - Application DATA PATCHING.audio AES67.audio MATRIXING.audio 2110-30.AES67.audio 6 - Presentation BUSSING.audio 5 - Session 4 - Transport ROUTING.audio IGMP.audio 3 - Network SWITCHING.audio CLOCKING.audio 2 - Data Link MULTICASTING.audio 1 - Physical RJ45.audio The Road to Incompatibility… Dante RAVENNA QLAN Livewire Control & Monitoring Proprietary HTTP, Ember+ TCP, HTTP HTTP, Proprietary Proprietary Proprietary Discovery Bonjour Proprietary Connection Proprietary RTSP, SIP, IGMP Proprietary Proprietary, HTTP, IGMP Management Session Description Proprietary SDP Proprietary Channel # Transport Proprietary, IPv4 RTP, IPv4 RTP, IPv4 RTP, IPv4 Quality of Service DiffServ DiffServ DiffServ DiffServ/802.1pq Encoding & Streaming L16-32, ≤4 ch/flow L16-32, ≤64 cha/str 32B-FP, ≤16 ch/str L24, st, surr Synchronization PTP1588-2002 PTP1588-2008 PTP1588-2008 Proprietary Media Clock 44.1kHz, 192kHz 44.1kHz – 384kHz 48kHz 48kHz AES67-2013 Standard for audio applications of networks: High-performance streaming audio-over-IP interoperability References
    [Show full text]
  • 5G and Net Neutrality
    University of Pennsylvania Carey Law School Penn Law: Legal Scholarship Repository Faculty Scholarship at Penn Law 2019 5G and Net Neutrality Christopher S. Yoo University of Pennsylvania Carey Law School Jesse Lambert University of Pennsylvania Law School Follow this and additional works at: https://scholarship.law.upenn.edu/faculty_scholarship Part of the Administrative Law Commons, Communication Technology and New Media Commons, European Law Commons, Internet Law Commons, Law and Economics Commons, Science and Technology Law Commons, and the Transnational Law Commons Repository Citation Yoo, Christopher S. and Lambert, Jesse, "5G and Net Neutrality" (2019). Faculty Scholarship at Penn Law. 2089. https://scholarship.law.upenn.edu/faculty_scholarship/2089 This Article is brought to you for free and open access by Penn Law: Legal Scholarship Repository. It has been accepted for inclusion in Faculty Scholarship at Penn Law by an authorized administrator of Penn Law: Legal Scholarship Repository. For more information, please contact [email protected]. 5G and Net Neutrality Christopher S. Yoo† and Jesse Lambert‡ Abstract Industry observers have raised the possibility that European network neutrality regulations may obstruct the deployment of 5G. To assess those claims, this Chapter describes the key technologies likely to be incorporated into 5G, including millimeter wave band radios, massive multiple input/multiple output (MIMO), ultra-densification, multiple radio access technologies (multi-RAT), and support for device-to-device (D2D) and machine-to-machine (M2M) connectivity. It then reviews the business models likely to be associated with 5G, including network management through biasing and blanking, an emphasis on business-to- business (B2B) communications, and network function virtualization/network slicing.
    [Show full text]
  • Net Neutral Quality of Service Differentiation in Flow-Aware Networks
    AGH University of Science and Technology Faculty of Electrical Engineering, Automatics, Computer Science and Electronics Ph.D. Thesis Robert Wójcik Net Neutral Quality of Service Differentiation in Flow-Aware Networks Supervisor: Prof. dr hab. in˙z.Andrzej Jajszczyk AGH University of Science and Technology Faculty of Electrical Engineering, Automatics, Computer Science and Electronics Department of Telecommunications Al. Mickiewicza 30, 30-059 Kraków, Poland tel. +48 12 634 55 82 fax. +48 12 634 23 72 www.agh.edu.pl www.eaie.agh.edu.pl www.kt.agh.edu.pl To my loving wife, Izabela Acknowledgements Many people have helped my throughout the course of my work on this dissertation over the past four years. I would like to express my gratitude to all of them and to a few in particular. First of all, I would like to thank my supervisor, Professor Andrzej Jajszczyk, for his invaluable comments, advice and constant support during my whole research. I am sure that without his patience, broad vision and motivation, completing this dissertation would not have been possible. I have been fortunate to meet James Roberts, the founder of the original con- cept of Flow-Aware Networking, and discuss several issues with. Our joint work on the project concerning FAN architecture was a milestone in my vision of the future Internet and strongly contributed to my understanding of the ideas and problems related to admission control, scheduling and network design. Much of my experience has been formed through the collaboration with Jerzy Domżał, my friend and collegue. His insight and remarks concerning various issues have contributed significantly to the improvement of my results.
    [Show full text]
  • Adding Enhanced Services to the Internet: Lessons from History
    Adding Enhanced Services to the Internet: Lessons from History kc claffy and David D. Clark [email protected] and [email protected] September 7, 2015 Contents 1 Introduction 3 2 Related technical concepts 4 2.1 What does “enhanced services” mean? . 4 2.2 Using enhanced services to mitigate congestion . 5 2.3 Quality of Service (QoS) vs. Quality of Experience (QoE) . 6 2.4 Limiting the use of enhanced services via regulation . 7 3 Early history of enhanced services: technology and operations (1980s) 7 3.1 Early 1980s: Initial specification of Type-of-Service in the Internet Protocol suite . 7 3.2 Mid 1980s: Reactive use of service differentation to mitigate NSFNET congestion . 10 3.3 Late 1980s: TCP protocol algorithmic support for dampening congestion . 10 4 Formalizing support for enhanced services across ISPs (1990s) 11 4.1 Proposed short-term solution: formalize use of IP Precedence field . 11 4.2 Proposed long-term solution: standardizing support for enhanced services . 12 4.3 Standardization of enhanced service in the IETF . 13 4.4 Revealing moments: the greater obstacle is economics not technology . 15 5 Non-technical barriers to enhanced services on the Internet (2000s) 15 5.1Early2000s:afuneralwakeforQoS............................ 15 5.2 Mid 2000s: Working with industry to gain insight . 16 5.3 Late 2000s: QoS becomes a public policy issue . 17 6 Evolving interconnection structure and implications for enhanced services (2010s) 20 6.1 Expansion of network interconnection scale and scope . 20 6.2 Emergence of private IP-based platforms to support enhanced services . 22 6.3 Advancing our empirical understanding of performance impairments .
    [Show full text]
  • Overview on IP Audio Networking Andreas Hildebrand, RAVENNA Evangelist ALC Networx Gmbh, Munich Topics
    Overview on IP Audio Networking Andreas Hildebrand, RAVENNA Evangelist ALC NetworX GmbH, Munich Topics: • Audio networking vs. OSI Layers • Overview on IP audio solutions • AES67 & RAVENNA • Real-world application examples • Brief introduction to SMPTE ST2110 • NMOS • Control protocols Overview on IP Audio Networking - A. Hildebrand # 1 Layer 2 Layer 1 AVB EtherSound Layer 3 Audio over IP Audio over Ethernet ACIP TCP unicast RAVENNA AES67 multicast RTP UDP X192 Media streaming Dante CobraNet Livewire Overview on IP Audio Networking - A. Hildebrand # 3 Layer 2 Layer 1 AVB Terminology oftenEtherSound Layer 3 Audio over IP • ambiguousAudio over Ethernet ACIP TCP unicast • usedRAVENNA in wrongAES67 context multicast RTP • marketingUDP -driven X192 Media streaming • creates confusion Dante CobraNet Livewire Overview on IP Audio Networking - A. Hildebrand # 4 Layer 2 Layer 1 AVB Terminology oftenEtherSound Layer 3 Audio over IP • ambiguousAudio over Ethernet ACIP TCP Audio over IP unicast • usedRAVENNA in wrongAES67 context multicast RTP • marketingUDP -driven X192 Media streaming • creates confusion Dante CobraNet Livewire Overview on IP Audio Networking - A. Hildebrand # 5 Layer 7 Application Application Application and Layer 6 Presentation protocol-based layers Presentation HTTP, FTP, SMNP, Layer 5 Session Session POP3, Telnet, TCP, Layer 4 Transport UDP, RTP Transport Layer 3 Network Internet Protocol (IP) Network Layer 2 Data Link Ethernet, PPP… Data Link Layer 1 Physical 10011101 Physical Overview on IP Audio Networking - A. Hildebrand # 10 Physical transmission Classification by OSI network layer: Layer 1 Systems Transmit Receive Layer 1 Physical 10011101 Physical Overview on IP Audio Networking - A. Hildebrand # 12 Physical transmission Layer 1 systems: • Examples: SuperMac (AES50), A-Net Pro16/64 (Aviom), Rocknet 300 (Riedel), Optocore (Optocore), MediorNet (Riedel) • Fully proprietary systems • Make use of layer 1 physical transport (e.g.
    [Show full text]
  • Differentiated Services and Pricing of the Internet MASSACHUSETTS
    Differentiated Services and Pricing of The Internet by Atanu Mukherjee Submitted to the System Design and Management Program in partial fulfillment of the requirements for the degree of Master of Science in Engineering and Management at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY May 1998 ( Massachusetts Institute of Technology. All rights reserved. Signatureof the Author....... .. -... ............................................... System Design and Management Program May 20l , 1998 Certifiedby...... .... , .............. .......................... ..... ........ Dr. Michael S. Scott Morton Jay W. Forrester Professor of Management, Sloan School of Management Thesis Supervisor Accepted by .............. .............................................. Dr. Thomas A. Kochan George M. B.ker Professor of Management, loan School of Management Co-Director, System Design and Management Program OF TECHXOO, MAY 281M t L.Re6 i COWC'UVE Differentiated Services and Pricing of the Internet by Atanu Mukherjee Submitted to the System Design and Management Program on May 20"', 1998, in partial fulfillment of the requirements for the degree of Master of Science in Engineering and Management Abstract The convergence of communication mediums and the diffusion of the Intemet into the society is blurring the distinction between voice, video and data. The ability to use a single communication infiastructure is very desirable as it brings down the cost of communication while increasing the flexibility of use. However, voice, video and data have different latency and bandwidth requirements. The valying characteristics leads to inconsistent delivery of the traffic streams in the presence of congestion in the network. In a best effort network, the quality of service is unpredictable if the network is overloaded. This thesis analyzes the market and bandwidth characteristics of the Internet and develops a service differentiation model, which provides preferential treatment to traffic streams using statistical drop preferences at the edges.
    [Show full text]
  • Dialogic® Bordernet™ 4000 Session Border Controller Product Description
    Dialogic® BorderNet™ 4000 Session Border Controller Product Description Release 3.4 Dialogic® BorderNet™ 4000 Session Border Controller Product Description Copyright and Legal Notice Copyright © 2012-2016 Dialogic Corporation. All Rights Reserved. You may not reproduce this document in whole or in part without permission in writing from Dialogic Corporation at the address provided below. All contents of this document are furnished for informational use only and are subject to change without notice and do not represent a commitment on the part of Dialogic Corporation and its affiliates or subsidiaries (“Dialogic”). Reasonable effort is made to ensure the accuracy of the information contained in the document. However, Dialogic does not warrant the accuracy of this information and cannot accept responsibility for errors, inaccuracies or omissions that may be contained in this document. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH DIALOGIC® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN A SIGNED AGREEMENT BETWEEN YOU AND DIALOGIC, DIALOGIC ASSUMES NO LIABILITY WHATSOEVER, AND DIALOGIC DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF DIALOGIC PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY INTELLECTUAL PROPERTY RIGHT OF A THIRD PARTY. Dialogic products are not intended for use in certain safety-affecting situations. Please see http://www.dialogic.com/company/terms-of-use.aspx for more details. Due to differing national regulations and approval requirements, certain Dialogic products may be suitable for use only in specific countries, and thus may not function properly in other countries.
    [Show full text]
  • Specialized Services and Net Neutrality
    Nokia Government Relations Policy Paper SPECIALIZED SERVICES AND NET NEUTRALITY Nokia Approaches Net Neutrality from a Market Value Perspective The network neutrality discussion remains contentious because some parties frame the issue in inflexible terms. Statements that all packets must receive identical treatment to ensure an open Internet, or that no consumer safeguards are necessary are not likely to facilitate a constructive debate or result in consensus. That is why Nokia views the discussion in more practical terms. Policymakers should seek to: Develop a regulatory framework that will protect consumers and businesses that develop Internet- based applications and services from unreasonable abuse or restrictions on their use of networks. Ensure that the framework also allows network operators sufficient flexibility in pricing and service offerings to fuel innovation. Value creation everywhere in the value chain, from infrastructure vendors and network operators to application makers and consumers is key to driving innovation. Avoiding abstract discussions is a critical component of developing a balanced plan that offers safeguards and innovation opportunities to all stakeholders in the Internet ecosystem. Market Realities Should Frame the Net Neutrality Discussion Mobile operators face an approximately 70 percent year-on-year growth in traffic. At the same time, in many markets the average revenue per user (ARPU) and return on capital employed (ROCEO) by the operators are flat or declining. Investment decisions are more challenging in this type of environment, which is one reason for the flat spending in the infrastructure sector the last few years. Specialized and differentiated services could allow operators to balance investment decisions with revenue expectations through improved monetization of network capacity.
    [Show full text]
  • Oracle Communications IP Service Activator Huawei Cartridge Guide, Release 7.4 E88218-01 Copyright © 2010, 2017, Oracle And/Or Its Affiliates
    Oracle® Communications IP Service Activator Huawei Cartridge Guide Release 7.4 E88218-01 December 2017 This guide provides detailed technical information about the Oracle Communications IP Service Activator Huawei cartridge, including supported features, device configuration, and a sample device configuration. About This Guide This guide consists of the following sections: ■ Cartridge Overview ■ IP Service Activator Huawei Cartridge Features ■ Installing the Cartridge ■ Device Configuration Audience This guide is intended for network managers and technical consultants responsible for implementing IP Service Activator within a network that uses the Huawei routers. Accessing Oracle Communications Documentation IP Service Activator for Oracle Communications documentation and additional Oracle documentation is available from Oracle Help Center: http://docs.oracle.com Related Documents For more information, see the following documents in the IP Service Activator documentation set: ■ See IP Service Activator Installation Guide for system requirements and information on installing, upgrading and uninstalling IP Service Activator. ■ See IP Service Activator System Administrator’s Guide for information and procedures related the duties a system administrator performs in monitoring and managing IP Service Activator. 1 Cartridge Overview IP Service Activator cartridges enable you to support your existing services, emerging services, and business needs. The cartridges operate in conjunction with the IP Service Activator core product. For more information,
    [Show full text]
  • Application Notes
    APPLICATION NOTES NETWORK SWITCH CONFIGURATIONS FOR DANTE & AES67 NETWORK SWITCH CONFIGURATIONS FOR DANTE & AES67 This document aims to provide general recommendations and configurations for network switches to be used with Powersoft amplifiers for Dante and AES67 connectivity, including examples. For remote control and monitoring of amplifiers, any type of network switch running on at least 100 Mbps will be sufficient. However, for transport of audio over IP via Dante or AES67, dedicated network switches and configurations may be necessary. This is specially the case in large and heavily loaded, or mixed, networks (e.g. audio + other data types). General Recommendations for Dante & AES67 For maximum Dante and/or AES67 network reliability, it is recommended that switches be/have: • Rated for gigabit Ethernet – although 100Mbps may be enough for a small and audio-dedicated network, larger and heavier installations may require a switch running on at least 1Gbps. • Non-blocking – in this type of device (almost every switch nowadays), all ports can run at full speed without any loss of data packets. The switch can handle the total bandwidth on all ports, establishing routing to any free output port without interfering with other traffic. • Managed – differently from unmanaged switches (plug-and-play), managed switches offer a series of different options and adjustments, such as the ability to prioritise the transport of certain types of data over others, and creating Virtual Local Area Networks (VLANs), which are particularly importantin mixed networks where audio is combined with other types of data. For small and audio-dedicated networks, unmanaged switches may be sufficient for Dante and AES67 operation.
    [Show full text]