Packet Level Performance Measurement Schemas and Their Limitations

Packet Level Performance Measurement Schemas and Their Limitations

John Schormans (Queen Mary University of London, UK) and Chi M. Leung (Queen Mary University of London, UK)
DOI: 10.4018/978-1-59140-570-2.ch008
OnDemand PDF Download:


New business opportunities for mobile, wireless, and fixed networks are going to require managed packet based services; this requires SLAs that relate to the level of QoS purchased, and the measurement (monitoring) of information loss and delay at the packet level. In this chapter we investigate the two available measurement techniques: passive and active monitoring. We show that passive monitoring techniques can provide excellent accuracy with minimal computational overhead. However, it also has the disadvantage that it is necessary to have access to all the routers in all measured end to end paths, so severely limiting scalability. Alternatively active monitoring techniques can provide global reach; however it is critical that we go on to show that this technique has the disadvantage that (under many circumstances) the measured results may be very inaccurate. Finally we propose some ideas which may enhance accuracy.

Complete Chapter List

Search this Book:
Table of Contents
Margherita Pagani
Chapter 1
Margherita Pagani
Nearly every incumbent operator in the wireless market has experienced business problems in recent years. The reason for this is the opening of the... Sample PDF
3G Wireless Market Attractiveness: Dynamic Challenges for Competitive Advantages
Chapter 2
G.K. Roberts, James B. Pick
This chapter identifies the technology and non-technology factors that companies consider important in deciding to adopt and deploy wireless devices... Sample PDF
Corporate Adoption of Mobile Cell Phone: Business Opportunities for 3G and Beyond
Chapter 3
Elizabeth Fife, Francis Pereira
The evaporation of dramatic growth forecasts for mobile data services highlights the need for greater understanding of user’s behavior, needs and... Sample PDF
Adoption of Mobile Data Services: Towards a Framework for Sector Analysis
Chapter 4
Phillip Olla
This chapter will describe how space technologies can be incorporated into terrestrial 3G /4G mobile telecommunication infrastructure to provide... Sample PDF
Incorporating Commercial Space Technology into Mobile Services: Developing Innovative Business Models
Chapter 5
Holtjona Galanxhi-Janaqi, Fiona F.H. Nah
Ubiquitous commerce, also referred to as “u-commerce” or “über-commerce”, is the combination of electronic, wireless/mobile, television, voice, and... Sample PDF
Ubiquitous Commerce: Beyond Wireless Commerce
Chapter 6
Bardo Fraunholz, Chandana Unnithan, Jürgen Jung
With dynamic growth and acceptance of mobile devices, many innovative business applications are beginning to emerge. Tracking and tracing seems to... Sample PDF
Tracking and Tracing Applications of 3G for SMEs
Chapter 7
Spiros Louvros, Athanassios C. Iossifides
In this chapter, a multi-layer ATM architecture is proposed for the interconnection of current and future mobile communications nodes. Consisting of... Sample PDF
Next Generation Cellular Network Planning: Transmission Issues and Proposals
Chapter 8
John Schormans, Chi M. Leung
New business opportunities for mobile, wireless, and fixed networks are going to require managed packet based services; this requires SLAs that... Sample PDF
Packet Level Performance Measurement Schemas and Their Limitations
Chapter 9
Claus Dietze
This chapter gives an introduction into the smart card technology and its history by outlining the role of the smart card in mobile communications... Sample PDF
The Smart Card in Mobile Communications: Enabler of Next-Generation (NG) Services
Chapter 10
Göran Pulkkis, Kaj J. Grahn, Jonny Karlsson, Mikko Martikainen, Daniel E. Daniel
This chapter is a topical overview of wireless local area network security evolution. WLAN security threats are surveyed. Covered standards include... Sample PDF
Recent Development in WLAN Security
Chapter 11
Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Angelo Corallo, Gianluca Elia
Mobile systems and applications are raising some important information security and privacy issues. This chapter discusses the need for privacy and... Sample PDF
Security, Privacy, and Trust in Mobile Systems and Applications
Chapter 12
Ioannis P. Chochliouros, Anastasia S. Spiliopoulou-Chochliourou
Mobile communications are fundamental to business operations, individual lifestyles and the welfare of the European economy. The proposed work aims... Sample PDF
Visions for the Completion of the European Successful Migration to 3G Systems and Services: Current and Future Options for Technology Evolution, Business Opportunities, Market Development, and Regulate
About the Authors