Next Generation Mobile Internet – Network and Service Platform Die Nächste Generation Des Mobilen Internet – Netz- Und Serviceplattform

Total Page:16

File Type:pdf, Size:1020Kb

Next Generation Mobile Internet – Network and Service Platform Die Nächste Generation Des Mobilen Internet – Netz- Und Serviceplattform Schwerpunktthema it 6/2008 Next Generation Mobile Internet – Network and Service Platform Die nächste Generation des mobilen Internet – Netz- und Serviceplattform Wolfgang Kellerer, Jörg Widmer, Hendrik Berndt, DOCOMO Communications Laboratories Europe GmbH, München Summary The Internet has become the main network tech- unserer Gesellschaft und hat sich damit zu der Schlüsseltech- nology supporting communications and Web services in all nologie der vernetzten Welt entwickelt. Damit das Internet areas of our society. In order to perform this role effi- dieser Rolle bei gesteigerten Anforderungen weiterhin gerecht ciently, a fundamental redesign of the Internet architecture werden kann, wird derzeit seine grundlegende Überarbeitung is being discussed. In particular, mobile devices and wire- diskutiert. In Zukunft werden insbesondere mobile Endgeräte less access networks will constitute an important part of the und drahtlose Zugangsnetze einen erheblichen Anteil an der Internet infrastructure. Based on a general discussion of re- Internet Infrastruktur haben. Daher geht dieser Artikel aus- quirements, this article focuses on the challenges of a next gehend von einer generellen Betrachtung der Anforderungen generation mobile Internet and discusses research approaches speziell auf die Herausforderungen eines Next Generation Mo- for mobility, addressing, heterogeneous access, and service bile Internet ein und diskutiert Forschungsansätze für Mobilität, platforms. Zusammenfassung Das Internet un- Adressierung, heterogene Zugangsnetze und Diensteplattfor- terstützt Kommunikation und Web Dienste in allen Bereichen men. KEYWORDS C.2.1 [Computer Systems Organization: Computer Communication Networks: Network Architecture and Design Future]; future Internet, mobile Internet, virtualization, overlay networks 1 Introduction ation Network (NGN) in fixed in- originating from its basic design The Internet has become the com- frastructures and the All IP Network principles. Targeted as a network for munications backbone of our soci- in mobile systems, the Internet Pro- robust data transport over a fixed ety in all respects. When using the tocol (IP) suite is expected to play infrastructure, its suitability for to- term Internet, we usually do not the dominant role in networking. day’s variety of services including limit ourselves to its core set of pro- With our theme on mobile Internet real-time traffic and mission crit- tocols such as TCP/IP but refer to in this article we cover the aspects of ical applications is limited. To fix itswholeofferofservicesandap- a next generation Internet encom- some of the problems, plenty ad- plications provided by a plethora passing the particular requirements ditional protocols have been pro- of protocols on all protocol layers. of mobile and wireless systems. posed, complementing IP in such Moreover, the Internet has stretched The importance of the Internet areas as security, mobility, and out from the fixed line infrastruc- can also be observed in the area quality of service (QoS). However, ture to cellular networks. There, of service delivery platforms, where none of these proposals have seen access to the Internet was offered the IP Multimedia System (IMS) widespread deployment in the In- as an add-on for second generation becomes more and more import- ternet. For a number of reasons, mobile networks. Today, the Inter- ant as a service platform for packet adding functionality to the current net protocols are an integral part of switched services for fixed and mo- Internet has become almost im- third generation mobile communi- bile networks. possible, leading to an ossification cation systems such as UMTS. With Despite its popularity, the Inter- of the Internet architecture. Thus, the emergence of the Next Gener- net suffers from several deficiencies recently initiatives have started to it – Information Technology 50 (2008) 6 / DOI 10.1524/itit.2008.0505 © Oldenbourg Wissenschaftsverlag 345 Schwerpunktthema reconsider the Internet design as ture. Yet, this is not reflected in Among the research undertaken such. the Internet design where both iden- to reconsider the Internet design, The most pressing problems to tity and location are designated by two directions can be observed. The be solved for the future Internet are IP addresses. This creates prob- clean slate approach tries to come summarized in the following para- lems when a host moves between up with a new Internet architecture graphs [1]. They can be grouped networks, is attached to multiple from scratch, whereas the evolu- by short term, mid term and long networks for multi-homing, or in tionary approach builds on step by term problems according to their case it has multiple service-specific step improvements, starting from urgency [2]. addresses. the existing design. Both should not The most obvious annoyance of Another problem of the Inter- be regarded as exclusive but rather the Internet that has to be solved on net to be solved in the medium complement each other. With over- a short term basis is probably Spam, term is the layered protocol refer- lays and virtualization, we describe followed by security as the biggest ence model itself, which is one of the tools for the implementation of so- imminent problem facing the Inter- main reasons why the other prob- lutions for both approaches. net. Today’s security infringements lems remain unsolved. Due to many The remainder of this article such as viruses, phishing, denial-of- short sighted fixes but also due to its is structured as follows. First, we service attacks, etc. largely diminish huge success as the platform for net- highlight selected mobile operator the users’ trust in the network and working, the architecture has ossi- related solution concepts to deal prevent critical applications from fied and lost all necessary flexibility. with the above requirements. In being deployed. A further problem Finally, while the problem of ad- Section 3 and Section 4, we describe is the presence of middleboxes such dress space depletion is addressed by mechanisms such as overlays, virtu- as firewalls or NATs, some of them IPv6, its widespread deployment is alization and cross-layer design as deployed to improve network secu- lagging behind. Enhancing the ad- tools to implement solutions in the rity. They do not fit well with the dress space through IPv6 or any core network and in the wireless original concept of end-to-end con- other suitable solution thus remains access network, respectively. Service nectivity and cause enormous prob- a problem to be solved in the long platform related aspects of a next lems for application developers. term. generation Internet are discussed in Medium term problems relate As a very general tendency, one Section 5. to QoS, management, routing, mo- can observe that the solutions to bility and the overall layered archi- those problems will move some 2 Selected Future Internet tecture itself. Despite many research intelligence back to the network, Concepts and standardization efforts the best- which is in favor of the operators to Of the general architectural prob- effort characteristic of the Internet be able to handle traffic flexibly with lems of the Internet discussed prevails. QoS is addressed by simple respect to the varying application above, some are more relevant to overprovisioning today. However, to requirements. In general, the oper- mobile operators than others. To cope with the rise in traffic volume ator expectations for a future Inter- use IP as a basis for future opera- and the requirements of emerging net target an innovation-friendly In- tor networks, specifically the aspects applications (e. g., real-time, inter- ternet that is service oriented rather of device mobility and multi-hom- active) as well as the use of net- than designed for host-to-host ing (or the use of multiple radio works with different physical layer packet forwarding, to prepare for interfaces for different wireless net- characteristics (e. g., wireless), com- unknown upcoming applications. works on the same device) need to prehensive solutions have to be de- For a mobile operator,thesame be solved. Also, addressing is an im- veloped and deployed in order to problems apply for its IP core net- portant issue, in particular if the transform the Internet from a com- work. In particular, when changing increase in the number of devices modity best-effort network to a com- the viewpoint from mainly fixed connected to an operator network mercialtelco-gradeone.Inthesame hosts to mobile hosts several chal- continues to increase. However, as way, Internet network management lenges have to receive additional long as device mobility or the use is lacking some of the functionality attention: Address management has of multiple radio interfaces are con- known from traditional telecommu- to be able to cope with a rapidly fined to the network(s) of a single nications. Further, the slow conver- increasing number of mobile ter- mobile operator, it is possible to de- gence and other deficiencies of the minals, each possibly equipped with ploy solutions without coordinating BGP protocol limit the scalability of several air interfaces of different with other operators, thus signifi- inter domain routing and thus limit QoS characteristics. Furthermore, cantly simplifying deployment hur- the business relationships between the heterogeneity of device capabil- dles compared to Internet ISPs. Internet service providers (ISPs). ities and wireless access links needs On the other hand, mobile op- Many of the Internet hosts are
Recommended publications
  • Diffserv -- the Scalable End-To-End Qos Model
    WHITE PAPER DIFFSERV—THE SCALABLE END-TO-END QUALITY OF SERVICE MODEL Last Updated: August 2005 The Internet is changing every aspect of our lives—business, entertainment, education, and more. Businesses use the Internet and Web-related technologies to establish Intranets and Extranets that help streamline business processes and develop new business models. Behind all this success is the underlying fabric of the Internet: the Internet Protocol (IP). IP was designed to provide best-effort service for delivery of data packets and to run across virtually any network transmission media and system platform. The increasing popularity of IP has shifted the paradigm from “IP over everything,” to “everything over IP.” In order to manage the multitude of applications such as streaming video, Voice over IP (VoIP), e-commerce, Enterprise Resource Planning (ERP), and others, a network requires Quality of Service (QoS) in addition to best-effort service. Different applications have varying needs for delay, delay variation (jitter), bandwidth, packet loss, and availability. These parameters form the basis of QoS. The IP network should be designed to provide the requisite QoS to applications. For example, VoIP requires very low jitter, a one-way delay in the order of 150 milliseconds and guaranteed bandwidth in the range of 8Kbps -> 64Kbps, dependent on the codec used. In another example, a file transfer application, based on ftp, does not suffer from jitter, while packet loss will be highly detrimental to the throughput. To facilitate true end-to-end QoS on an IP-network, the Internet Engineering Task Force (IETF) has defined two models: Integrated Services (IntServ) and Differentiated Services (DiffServ).
    [Show full text]
  • IP Telephony Glossary of Terms
    Cisco IP Telephony Glossary of Terms A helpful guide to the terminology you need to know as you investigate the advantages of a converged network. Cisco Systems All contents are Copyright © 1992–2001 Cisco Systems, Inc. All rights reserved. Important Notices and Privacy Statement. Page 1 of 30 IP Telephony Glossary of Terms A helpful guide to the terminology you need to know as you investigate the advantages of a converged network. To find a specific term by letter of the alphabet, please click on the letter to the left. A abandoned A call in which the caller hangs up before the call is call answered. access On a PBX, a dialing number, such as 9, used to access an digit outside line. Also called access code. access A gateway that allows the IP PBX to communicate with the gateway PSTN or traditional PBX systems. See also IP, PBX, and PSTN. access Part of ISO-OSI layered protocol model. layer access line A transmission line that provides access to a larger system or network. access link The local access connection between a customer's premises and a carrier's point of presence (POP), which is the carrier's central switching office or closest point of local termination. access The technique for moving data, voice, or video between method storage and input/output devices. access port Connects a network device to an IP device. For example, a computer can be connected to an IP phone through an access port. access A set of specific procedures that enable a user to obtain protocol services from a telephone company or network.
    [Show full text]
  • TSN Algorithms for Large Scale Networks: a Survey And
    1 TSN Algorithms for Large Scale Networks: A Survey and Conceptual Comparison Ahmed Nasrallah, Venkatraman Balasubramanian, Akhilesh Thyagaturu, Martin Reisslein, and Hesham ElBakoury Abstract—This paper provides a comprehensive survey of to multimedia) industrial control, automotive, and avionics queueing and scheduling mechanisms for supporting large scale applications, and mobile backhaul that require just-in-time deterministic networks (LDNs). The survey finds that extensive delivery of data traffic. Similarly, the IETF Deterministic mechanism design research and standards development for LDNs has been conducted over the past few years. However, these Networking (DetNet) group is working in collaboration with mechanism design studies have not been followed up with a the TSN group to develop standardization of IP (L3) layer comprehensive rigorous evaluation. The main outcome of this deterministic forwarding services. survey is a clear organization of the various research and stan- The main enabler for synchronous traffic deterministic dardization efforts towards queueing and scheduling mechanisms forwarding services is the Cyclic Queuing and Forwarding for LDNs as well as the identification of the main strands of mechanism development and their interdependencies. Based (CQF) protocol. More specifically, the CQF protocol typically on this survey, it appears urgent to conduct a comprehensive combines a Time-Aware Shaper (TAS) at the egress port of rigorous simulation study of the main strands of mechanisms. a switch and Per-Stream Filtering and Policing (PSFP) at the ingress port of a switch, to shape and regulate the transmission selection. This transmission selection within switches utilizes I. INTRODUCTION time division multiplexing based on an underlying time syn- A. Motivation chronization in L2 bridged networks [2].
    [Show full text]
  • Service Oriented Internet
    Service Oriented Internet ¡ ¡ ¡ ¢ Jaideep Chandrashekar , Zhi-Li Zhang , Zhenhai Duan , and Y. Thomas Hou £ University of Minnesota, Minneapolis, MN 55455, USA, ¤ jaideepc,zhzhang,duan ¥ @cs.umn.edu ¦ Virginia Tech, Blacksburg, VA 24061, USA, [email protected] Abstract. Effective service delivery capabilities are critical to the transformation of the Internet into a viable commercial infrastructure. At the present time, the ar- chitecture of the Internet is inadequately equipped to provide these capabilities. Traditionally, overlay networks have been proposed as a means of providing rich functionality at the upper layers. However, they suffer from their own drawbacks and do not constitute a perfect solution. In this paper, we propose a novel, overlay based Service Oriented Internet architecture that is meant to serve as a flexible, unifying and scalable platform for delivering services over the Internet. As part of this architecture, we introduce a new two-level addressing scheme and an as- sociated service layer. We also describe the functionality of the new network ele- ments that are introduced, namely service gateway and service point-of-presence, and subsequently discuss algorithms that are responsible for distributing service reachability across the overlay framework. We also present a few examples of application services that benefit significantly when deployed on our architecture. 1 Introduction Over the last decade, the unanticipated popularity of applications such as the World Wide Web and E-mail has transformed the Internet into the de facto global information infrastructure that underlies much of today’s commercial, social and cultural activities. People rely on the Internet for a variety of services essential to their daily lives, ranging from communications and information access to e-commerce and entertain- ment.
    [Show full text]
  • B-ISDN (Broadband Integrated Services Digital Network)
    UC Irvine Recent Work Title B-ISDN (Broadband Integrated Services Digital Network) Permalink https://escholarship.org/uc/item/68w38300 Authors Ayanoglu, Ender Akar, Nail Publication Date 2002-05-25 eScholarship.org Powered by the California Digital Library University of California B-ISDN (Broadband Integrated Services Digital Network) Ender Ayanoglu and Nail Akar Version 1.3 May 25, 2002 ABSTRACT The subject of B-ISDN came into being in the late 1980s, together with the concept of Asynchronous Transfer Mode (ATM). ATM is closely tied to high-speed packet switching by means of specialized switches implemented in hardware. Due to its high speed and packet structure, ATM technology was considered attractive to unify voice, data, and video services. A unification of these services over the telephone infrastructure was attempted earlier by a standards offering known as Integrated Services Digital Network (ISDN). Consequently, this new service unification was termed Broadband ISDN (B-ISDN). Although due to its origins, B-ISDN is sometimes closely tied to ATM technology, the term independently represents the vision of packet-based high-speed integration of voice, data, and video services. It is important that in this process, guarantees to satisfy different Quality-of-Service (QoS) needs (in terms of delay, loss, etc) required by voice, data, and video services are provided. In this vision, what is important is the unification, or integration of services; and the underlying technology is of secondary importance. As of the early 2000s, the technology to be employed in realizing this vision seems to have shifted from its origins of ATM. In this article, our emphasis is on B-ISDN as a service integration vision.
    [Show full text]
  • ACM-Survey2010.Pdf
    A Survey on the Design, Applications, and Enhancements of Application-Layer Overlay Networks JINU KURIAN and KAMIL SARAC University of Texas at Dallas This article presents a survey of recent advancements in application-layer overlay networks. Some of the most important applications that have been proposed for overlays include multicast, QoS support, denial- of-service (DoS) defense, and resilient routing. We look at some of the important approaches proposed for these applications and compare the advantages and disadvantages of these approaches. We also examine some of the enhancements that have been proposed in overlay topology design, enhanced routing perfor- mance, failure resistance, and the issues related to coexistence of overlay and native layers in the Internet. We conclude the article with a comment on the purist vs pluralist argument of overlay networks that has received much debate recently. Finally, we propose a new deployment model for service overlays that seeks to interpose between these two approaches. Categories and Subject Descriptors: C.2.1 [Computer-Communication Networks]: Network Architecture and Design; C.2.3 [Computer-Communication Networks]: Network Operations General Terms: Design, Economics, Performance, Reliability, Security Additional Key Words and Phrases: Overlay networks, service overlay networks, performance, enhance- ments, deployment model ACM Reference Format: 5 Kurian, J. and Sarac, K. 2010. A survey on the design, applications, and enhancements of application-layer overlay networks. ACM Comput. Surv. 43, 1, Article 5 (November 2010), 34 pages. DOI = 10.1145/1824795.1824800 http://doi.acm.org/10.1145/1824795.1824800 1. INTRODUCTION Over the last few years, overlay networks have garnered much interest in the research and industrial community.
    [Show full text]
  • ECE/COMPSCI 356 Computer Network Architecture Lecture 22: Quality of Service
    ECE/COMPSCI 356 Computer Network Architecture Lecture 22: Quality of Service Neil Gong [email protected] Slides credit: Xiaowei Yang, PD Overview • Why QoS? – Real-time applications • Approaches to QoS – Fine-grained • Integrated services – Coarse-grained • Differentiated services 2 Real-time applications • Timeliness of delivery can be very important. We refer to applications that are sensitive to the timeliness of data as real- time applications. Real-time applications • Voice and video applications tend to be the canonical examples, but there are others such as industrial control—you would like a command sent to a robot arm to reach it before the arm crashes into something. • Even file transfer applications can have timeliness constraints, such as a requirement that a database update complete overnight before the business that needs the data resumes on the next day. Real-time applications • The distinguishing characteristic of real-time applications is that they need some sort of assurance from the network that data is likely to arrive on time (for some definition of “on time”). • Whereas a non-real-time application can use an end-to-end retransmission strategy to make sure that data arrives correctly, such a strategy cannot provide timeliness. • This implies that the network will treat some packets differently from others—something that is not done in the best-effort model. • A network that can provide these different levels of service is often said to support quality of service (QoS). An example real-time application • Data is generated
    [Show full text]
  • AV Line Managed Switches
    Datasheet | M4250 series AV Line Managed Switches Switching Engineered for AV over IP The NETGEAR M4250 Switch Series generally use 1Gbps or 10Gbps per Q-SYS and AES67 profiles are available, introduces the AV Line, developed and stream and the AV Line of M4250 targets as well as an AVB profile requiring an engineered for audio/video professionals the widespread 1Gbps codecs. AVB license sold separately. For video with dedicated service and support. PoE+, Ultra90 PoE++ and rear-facing ports the M4250 offers profiles for NVX, SVSI, M4250 has been built from the ground ensure a clean integration in AV racks. Q-SYS, NDI, Dante etc. as well as audio/ up for the growing AV over IP market, M4250 switches come pre-configured for video/control mixed profiles. When combining years of networking expertise standard audio and video signals. When multiple switches, NETGEAR IGMP Plus™ in AV with M4300 and M4500 series with requirements are more specific, an AV brings automation for you to just connect best practices from leading experts in user interface offers customization with them together, or with M4300 and M4500 the professional AV market. AV codecs port-based profiles. For audio Dante, switches. Highlights Extended AV features • Built-in IT web GUI, console, telnet • Fully featured L2/L3/L4 platform for • Dedicated AV web-based GUI and SSH consistent with other midsize Enterprise campus networks, interface for more specific AV NETGEAR M4300 and M4500 series IoT and IPTV installations • Feature set includes static, RIP and PIM Industry standard
    [Show full text]
  • Providing Integrated Service Access Part 1
    Providing Integrated Service Access Part 1 - Services A White Paper from Inalp Networks Inc Meriedweg 7 CH-3172 Niederwangen Switzerland http://www.inalp.com Providing Integrated Service Access - Part 1 - Services March 2001 Contents CONTENTS ..................................................................................................................2 1 EXECUTIVE SUMMARY........................................................................................3 2 INTRODUCTION ....................................................................................................4 3 WHY SHOULD SERVICE PROVIDERS USE INTEGRATED ACCESS?...............5 4 THE ISSUES AND THE SOLUTIONS....................................................................5 4.1 Transmission independent service provisioning ..................................................................6 4.1.1 Diversification in access .......................................................................................................6 4.1.2 Remote provisioning.............................................................................................................6 4.2 Providing telephony services..................................................................................................6 4.2.1 The ISDN legacy interface....................................................................................................6 4.2.2 Quality expectations .............................................................................................................7 4.2.3 Feature
    [Show full text]
  • Differentiated Services Framework
    Differentiated Services framework Risto Mononen Nokia Telecommunications P.O. Box 300, FIN-00045 NOKIA GROUP [email protected] not consider these more complex solutions for the Abstract following reasons: Voice over IP and other jitter sensitive applications have 1. The stateless forwarding with classes can be taken raised the demand for Quality of Service guarantees in into use with minimal effort which makes it viable the Internet. The traffic must be classified and in the near future. prioritized according to application specific needs. The Differentiated Services framework provides means for 2. There already exist several resource reservation stateless low-cost classification. This paper summarizes (RSVP etc.) and virtual circuit (ATM, MPLS, etc.) the IETF's DiffServ Internet Draft. oriented technologies. Dynamic QoS and statefulness in DiffServ partly overlaps with these known technologies and does not actually introduce Introduction anything new into the field. Differentiated Services (DiffServ, DS) has background in the IETF's Integrated Services (IntServ) and Resource Inside each DS class the traffic is still best effort in the Reservation Protocol (RSVP) work. Lots of DS domain. Policing and pricing prevents all senders expectations were laid on IntServ. However, IntServ from requesting the highest priority, which would nodes have turned out to keep too much per-flow state degenerate the DS domain into traditional best-effort information to be scalable to large networks. network without real QoS support. Policing takes place at the network boundaries. It adds complexity at the boundaries but is necessary to protect the backbone from IntServ overloading. Best-effort domain domain DS domain DS domain Differentiated Services framework [2] and DiffServ charter [1] have been the main sources for this paper.
    [Show full text]
  • Design and Implementation of a Differentiated Service Based Qos Model for Real-Time Interactive Traffic on Constrained Bandwidth Ip Networks
    DESIGN AND IMPLEMENTATION OF A DIFFERENTIATED SERVICE BASED QOS MODEL FOR REAL-TIME INTERACTIVE TRAFFIC ON CONSTRAINED BANDWIDTH IP NETWORKS Thesis submitted to Indian Institute of Technology, Kharagpur for the award of the degree of Master of Science by Sruti Gan Chaudhuri under the guidance of Dr. C.S. Kumar Department of Mechanical Engineering and Prof. R.V. Raja Kumar Department of Electronics and Electrical Communication Engineering G. S. SANYAL SCHOOL OF TELECOMMUNICATIONS INDIAN INSTITUTE OF TECHNOLOGY, KHARAGPUR, INDIA. February 2010 ©2010 Sruti Gan Chaudhuri. All rights reserved. APPROVAL OF THE VIVA-VOCE BOARD /02/2010 Certified that the thesis entitled DESIGN AND IMPLEMENTATION OF A DIFFERENTIATED SERVICE BASED QOS MODEL FOR REAL-TIME INTERACTIVE TRAFFIC ON CONSTRAINED BANDWIDTH IP NETWORKS submitted by SRUTI GAN CHAUDHURI to the Indian Institute of Technology, Kharagpur, for the award of the degree Master of Science has been accepted by the external examiners and that the student has successfully defended the thesis in the viva-voce examination held today. (Member of the DSC) (Member of the DSC) (Member of the DSC) (Supervisor) (Supervisor) (External Examiner) (Chairman) ii /02/2010 CERTIFICATE This is to certify that the thesis entitled Design and Implementation of a Differentiated Service based QoS Model for Real-Time Interactive Traffic on Constrained Bandwidth IP Networks, submitted by Sruti Gan Chaudhuri to Indian Institute of Technology, Kharagpur, is a record of bona fide research work under our supervision and we consider it worthy of consideration for the award of the degree of Master of Science of the Institute. Signature of Supervisor(s) __________________________________ ____________________________________ Prof.
    [Show full text]
  • Qos) in High-Priority Applications Abstract
    The Conversion Technology Experts Quality of Service (QoS) in High-Priority Applications Abstract It is apparent that with the introduction of new technologies such as Voice over IP and digital video, network managers and administrators have a tough time keeping up with ever-increasing bandwidth requirements. Such technologies are brought with historically high expectations for reliability and quality. Today’s networks must treat these services as high priority. These traditionally “best effort” Local Area Network protocols (Ethernet etc.) face a difficult time handling these High Priority requirements. Quality of Service (QoS) promises better handling of these new challenges; increasing reliability and quality. Network administrators have two major types of QoS techniques available. They can attempt to negotiate, reserve and hard-set capacity for certain types of service (hard QoS), or just prioritize data without reserving any “capacity setting” (soft QoS). This paper will discuss both hard and soft QoS techniques including 802.1P, IP Precedence, Differentiated Services, Resource Reservation Protocol (RSVP) and ATM specific priority resources. The paper will also explain how to implement QoS features on Transition Networks’ Management Aggregation Converter. 2 QoS 101 QoS stands for Quality of Service. In QoS the bandwidth, error rates and latency can be monitored, sampled and possibly improved. QoS also delivers the set of tools to help deliver data efficiently by reducing the impact of delay during peak times when networks are approaching full capacity. QoS does not add capacity; nor does it multiplex the signals like WDM. It simply tries to manage data traffic better so that top priority traffic will not be compromised.
    [Show full text]