116 results on '"Michel Ouellette"'
Search Results
2. CaRMS at 50: Making the match for medical education
- Author
-
Lisa Turriff, John Gallinger, Michel Ouellette, and Eric Peters
- Subjects
Education (General) ,L7-991 ,Medicine (General) ,R5-920 - Abstract
Entry into postgraduate medical training in Canada is facilitated through a national application and matching system which establishes matches between applicants and training programs based on each party’s stated preferences. Health human resource planning in Canada involves many factors, influences, and decisions. The complexity of the system is due, in part, to the fact that much of the decision making is dispersed among provincial, territorial, regional, and federal jurisdictions, making a collaborative national approach a challenge. The national postgraduate application and matching system is one of the few aspects of the health human resources continuum that is truly pan-Canadian. This article examines the evolution of the application and matching system over the past half century, the values that underpin it, and CaRMS' role in the process.
- Published
- 2020
- Full Text
- View/download PDF
3. Response to Hypothetical Social Scenarios in Individuals with Traumatic Brain Injury Who Present Inappropriate Social Behavior: A Preliminary Report
- Author
-
Michel Ouellette, Pierre McDuff, Sacha Daelman, François-Pierre Decoste, Anne Henry, and Jean Gagnon
- Subjects
inappropriate social behavior ,traumatic brain injury ,decision making ,social interaction ,Psychology ,BF1-990 - Abstract
Background: Very little research thus far has examined the decision making that underlies inappropriate social behavior (ISB) post-TBI (traumatic brain injury). Objectives: To verify the usefulness of a new instrument, the Social Responding Task, for investigating whether, in social decision making, individuals with TBI, who present inappropriate social behavior (ISB), have difficulty anticipating their own feelings of embarrassment and others’ angry reactions following an ISB. Methods: Seven subjects with TBI presenting with inappropriate social behavior (TBI-ISB), 10 presenting with appropriate social behavior (TBI-ASB), and 15 healthy controls were given 12 hypothetical scenarios three times, each time ending with a different behavioral response. Subjects were asked to gauge the likelihood of their displaying the behavior in that situation (part A) and of it being followed by an angry reaction from the other or by feelings of embarrassment in themselves (part B). Results: TBI-ISB subjects scored higher than TBI-ASB and healthy controls on a scale of likelihood of displaying an ISB. Results regarding expectations of angry reactions from others and feelings of embarrassment after an ISB were similar among groups. Negative correlations between endorsement of an inappropriate behavior and anticipation of negative emotional consequences were significant for both TBI-ASB and control subjects, but not for TBI-ISB subjects. Conclusions: Results suggest that the TBI-ISB participants were likely to endorse an ISB despite being able to anticipate a negative emotional response in themselves or others, suggesting that there were other explanations for their poor behavior. A self-reported likely response to hypothetical social scenarios can be a useful approach for studying the neurocognitive processes behind the poor choices of individuals with TBI-ISB, but the task needs further validation studies. A comprehensive discussion follows on the underlying mechanisms affecting social behaviors after a TBI.
- Published
- 2013
- Full Text
- View/download PDF
4. Supplementary Figure 1 from Cyclin-Dependent Kinase 5 Is Amplified and Overexpressed in Pancreatic Cancer and Activated by Mutant K-Ras
- Author
-
Michael A. Hollingsworth, Michel Ouellette, Robin R. High, Thomas C. Caffrey, Judy M. Andersen, Benjamin J. Swanson, Pankaj K. Singh, Jarrod Tremayne, Michelle E. Lewallen, Eric C. Collisson, Paul M. Grandgenett, and John P. Eggers
- Abstract
PDF file - 128K
- Published
- 2023
5. An adaptive buffer management mechanism for improving TCP behavior under heavy load.
- Author
-
James Aweya, Michel Ouellette, Delfin Y. Montuno, and Alan Chapman
- Published
- 2001
- Full Text
- View/download PDF
6. Enhancing network performance with TCP rate control.
- Author
-
James Aweya, Michel Ouellette, Delfin Y. Montuno, and Zhonghui Yao
- Published
- 2000
- Full Text
- View/download PDF
7. Synchronous Ethernet and IEEE 1588 in Telecoms: Next Generation Synchronization Networks
- Author
-
Jean-Loup Ferrant, Mike Gilson, Sébastien Jobert, Michael Mayer, Laurent Montini, Michel Ouellette, Silvana Rodrigues, Stefano Ruffini
- Published
- 2013
8. Response to letter to the editor 'Re: ‘CaRMS at 50’'
- Author
-
John Gallinger, Eric Peters, Lisa Turriff, and Michel Ouellette
- Subjects
Medicine (General) ,Letter to the editor ,R5-920 ,Philosophy ,General Materials Science ,Education (General) ,L7-991 ,Letters to the Editor ,Classics - Published
- 2020
9. CaRMS at 50: Making the match for medical education
- Author
-
Eric Peters, John Gallinger, Michel Ouellette, and Lisa Turriff
- Subjects
Canadiana ,Matching (statistics) ,Medicine (General) ,Process (engineering) ,business.industry ,Health human resources ,Education (General) ,Public relations ,Strategic human resource planning ,R5-920 ,Political science ,Medical training ,General Materials Science ,L7-991 ,business - Abstract
Entry into postgraduate medical training in Canada is facilitated through a national application and matching system which establishes matches between applicants and training programs based on each party's stated preferences. Health human resource planning in Canada involves many factors, influences, and decisions. The complexity of the system is due, in part, to the fact that much of the decision making is dispersed among provincial, territorial, regional, and federal jurisdictions, making a collaborative national approach a challenge. The national postgraduate application and matching system is one of the few aspects of the health human resources continuum that is truly pan-Canadian. This article examines the evolution of the application and matching system over the past half century, the values that underpin it, and CaRMS' role in the process.L’entrée dans la formation médicale postdoctorale au Canada est facilitée par un système national de demande et de jumelage qui établit des correspondances entre les candidats et les programmes de formation en fonction des préférences déclarées par chaque partie.La planification des ressources humaines en santé au Canada implique de nombreux facteurs, influences et décisions. La complexité du système est due, en partie, au fait qu'une grande partie du processus décisionnel est réparti entre les compétences provinciales, territoriales, régionales et fédérales, ce qui rend difficile une approche nationale collaborative. Le système national de demande postdoctorale et de jumelage est l'un des rares aspects du continuum des ressources humaines en santé qui est véritablement pancanadien.Cet article examine l'évolution du système d'application et de jumelage au cours du dernier demi-siècle, les valeurs qui le sous-tendent et le rôle du CaRMS dans le processus.
- Published
- 2020
10. Grand fauve dehors
- Author
-
Michel Ouellette and Michel Ouellette
- Abstract
Un narrateur reçoit et transcrit la « confession » d'un sujet anonyme qui dévoile peu à peu un versant profondément trouble de son être. Des femmes sont portées disparues. Un enquêteur de police à la retraite rôde dans les parages, avide d'indices. A-t-on affaire à un criminel? Un père refait surface dans la vie de son fils après avoir été kidnappé et maintenu en captivité pendant une quinzaine d'années. Alors qu'ils réapprennent à se connaître, ils découvrent, chacun à leur façon, ce que c'est que de vivre en liberté. Dans un village fictif du nord de l'Ontario où règne l'entreprise familiale Thèbes Lumber, Jocaste épouse malgré elle un cousin violent dont elle a secrètement porté l'enfant. Puis vient Œdipe, avec qui elle connaît le grand amour… Le clan de Thèbes saura-t-il échapper à son destin mythique? Au cœur de ces trois récits brefs sourd une violence qui ne laisse personne indemne.
- Published
- 2022
11. Le retour du capitaine Baboune
- Author
-
Michel Ouellette and Michel Ouellette
- Abstract
Loïc et son fidèle compagnon, le petit dragon peureux Portagne des Montagnes, se retrouvent dans une forteresse cauchemardesque. L'irascible capitaine Baboune y carbure toujours à la mauvaise humeur, malgré l'humiliation qu'il a subie la dernière fois que son chemin a croisé celui de Loïc… Baboune opère désormais une machine à détourner les vents. Elle fonctionne grâce à la bougonnerie d'adultes mécontents de leur sort. Loïc et Portagne des Montagnes, aidés par un corbeau enchanté, doivent trouver la clé qui permettra de détruire cet engin infernal et ainsi sauver les adultes!
- Published
- 2021
12. Montjoie
- Author
-
Michel Ouellette and Michel Ouellette
- Subjects
- Short stories, Escape (Psychology), Cross-dressers
- Abstract
Hantée par le sentiment persistant d'avoir tué quelqu'un, avant, dans son autre vie, Manon quitte Las Vegas à la recherche de la vérité. Si, dans un premier temps, ses retrouvailles avec des amis de jeunesse lui permettent de remonter le fil du passé, bientôt, sa quête vient brouiller l'identité qu'elle s'est façonnée au loin. C'est que Manon, avant, était Gerry… Fuyant toujours plus au nord, elle revient à Timmins – sa ville natale, où convergent tous ses fantômes – à la recherche de la réponse à cette question qui la taraude. Roman à la frontière de la quête et de l'enquête, «Montjoie» construit en pointillé un récit polyphonique où se dérobent toutes les certitudes.
- Published
- 2020
13. A French adaptation of the Overt Behaviour Scale (OBS) measuring challenging behaviours following acquired brain injury: The Échelle des comportements observables (ÉCO)
- Author
-
Denis Godbout, Grahame K. Simpson, Jacques Drolet, Jean Gagnon, Glenn Kelly, and Michel Ouellette
- Subjects
Adult ,Male ,030506 rehabilitation ,Adolescent ,Psychometrics ,Challenging behaviour ,medicine.medical_treatment ,Neuroscience (miscellaneous) ,Poison control ,Young Adult ,03 medical and health sciences ,0302 clinical medicine ,Surveys and Questionnaires ,parasitic diseases ,Developmental and Educational Psychology ,medicine ,Humans ,Translations ,Acquired brain injury ,Reliability (statistics) ,Aged ,Problem Behavior ,Rehabilitation ,Reproducibility of Results ,Construct validity ,Cognition ,Middle Aged ,medicine.disease ,Brain Injuries ,Scale (social sciences) ,Female ,France ,Neurology (clinical) ,0305 other medical science ,Psychology ,Social psychology ,030217 neurology & neurosurgery ,Clinical psychology - Abstract
To develop a French version of the Overt Behaviour Scale (OBS) and examine some of its psychometric properties.The scale was adapted and validated according to standard guidelines for cross-cultural adaptation of questionnaires (Échelle des comportements observables; ÉCO). The reliability and construct validity of the ÉCO were studied among 29 inpatients and outpatients who sustained an acquired brain injury. The instruments were administered by 12 clinicians located at eight rehabilitation centres and the local brain injury association.The ÉCO provided behaviour profile descriptives much like the original scale. It showed excellent reliability and good convergent and divergent validity, as reflected by significant associations with other measures that contained similar behavioural items and by the absence of signification correlations with broader constructs such as physical and cognitive abilities.This study provides evidence that the ÉCO behaves much like the original OBS, has promising initial findings with respect to reliability and validity and is a valuable research and clinical instrument to assess the severity and typology of challenging behaviour after an acquired brain injury and to monitor the evolution of behaviours after intervention in French and bilingual communities.
- Published
- 2016
14. Le dire de Di
- Author
-
Michel Ouellette and Michel Ouellette
- Abstract
Di a 16 ans et habite la grande maison familiale perdue entre champs et forêts. Elle y vit dans une sorte d'enchantement aux côtés de Makati, sa mère adorée, de Paclay, son papa rêveur, et du beau Mario Morneau, deuxième mari de sa mère. Or, voici que l'arrivée de Peggy Bellatus et de ses effrayantes machines minières qui bouleversent la terre, les désirs et les secrets vient rompre ce fragile et merveilleux équilibre. Avec cette pièce «pour une femme seule», Michel Ouellette poursuit son exploration des frontières théâtrales : le personnage, composé comme un poème, s'exprime dans une langue bigarrée et joueuse, pleine de trous et de rebonds. Il en résulte un poème scénique tout en spirale, ludique et poignant.
- Published
- 2018
15. Trompeuses lumières
- Author
-
Michel Ouellette and Michel Ouellette
- Subjects
- French-Canadian fiction--21st century, French-Canadian fiction--20th century
- Abstract
Un homme raconte par bribes une histoire de son enfance, celle d'un villageois mort et enterré qui serait revenu à la vie par une nuit étoilée. L'homme avait été découvert dans le cimetière aux côtés d'une jeune femme ivre morte, Effi. Celui que l'on a surnommé Lazarus est aphasique et amnésique, sans voix et sans empreintes digitales. Une policière, déterminée à percer son secret, ira à la rencontre des personnes qui auraient entouré cet être mystérieux. En filigrane se dessine le portrait d'un village du nord ontarien aux prises avec le poids du souvenir. Dans ce roman aux accents métaphysiques, à la frontière de la réalité et de l'onirisme, les villageois sont appelés à se questionner sur l'existence même des choses et des événements.
- Published
- 2017
16. Pliures
- Author
-
Michel Ouellette and Michel Ouellette
- Abstract
«Pliures» se construit autour d'un deuil. Le poète y traite de la maladie de son père, de sa mort, et s'interroge sur leurs rapports. La distance, jamais comblée, qui les séparait se transforme ici en un retour sur le sentier des souvenirs. Par les mots, la voix poétique cherche à apprivoiser le père dépouillé des artifices de l'autorité, un homme dont les passions, les rêves et les blessures ont été vécues en silence jusqu'à la fin. Une bouleversante conversation à sens unique. Avec ce recueil, Michel Ouellette, figure incontournable de la littérature franco-ontarienne, révèle une introspection où le corps, à force de chercher à pallier l'absence, en vient à se ronger de l'intérieur.
- Published
- 2016
17. La fille d’argile
- Author
-
Michel Ouellette and Michel Ouellette
- Subjects
- Fathers and daughters--Drama, French-Canadian drama, Theater, French-Canadian
- Abstract
Lili, jeune fille habillée en punk, se réfugie dans l'atelier de son père. Elle est couverte de sang et tremble à l'idée qu'elle vient peut-être de tuer un inconnu pour plaire à ses amis néonazis. Trois heures du matin. Ken, le père, un homme d'affaires peu scrupuleux, pénètre à son tour dans l'atelier. Il parle à son comptable au téléphone tout en sculptant une statuette d'argile. Il entend un bruit, voit sa fille et remarque le piètre état dans lequel elle se trouve. Suivra un affrontement entre fille et père dans un huis-clos brutal. Lili, l'ado rebelle, cherchera à échapper à sa peur en projetant sa colère sur son père, qu'elle rendra responsable de sa misère, lui reprochant ses absences, son égoïsme, le fait qu'il ait renoncé à ses idéaux de jeunesse... Pour Ken, aux prises avec des problèmes financiers, ce sera à l'occasion de prendre la place qu'il n'a jamais su occuper dans le cœur de sa fille. Le Théâtre la Catapulte a produit un excellent dossier d'accompagnement qui aide le lecteur à bien comprendre l'univers de la pièce, traite des enjeux qui y sont explorés et propose des activités pour les approfondir. Il présente également les éléments du spectacle, comme la mise en scène, les costumes, l'environnement sonore, etc. Le dossier est disponible gratuitement en ligne à http://catapulte.ca/Media/Content/files/DOSSIER_ACCOMPAGNEMENT-La_Fille_dargile.pdf. On peut aussi le demander par courriel en écrivant à communications@catapulte.ca.
- Published
- 2015
18. Development of the first IEEE 1588 telecom profile to address mobile backhaul needs
- Author
-
Silvana Rodrigues, Michel Ouellette, Sebastien Jobert, Jean‐Loup Ferrant, Michael Mayer, Stefano Ruffini, Laurent Montini, and Mike Gilson
- Subjects
IEEE 802.11u ,IEEE 802 ,Computer Networks and Communications ,business.industry ,Computer science ,Inter-Access Point Protocol ,Computer Science Applications ,IEEE 802.1Q ,DNP3 ,IEEE 802.2 ,IEEE 802.11g-2003 ,Mobile telephony ,Electrical and Electronic Engineering ,IEEE 802.1X ,business ,Telecommunications ,IEEE 802.11r-2008 ,IEEE 802.11s ,Computer network - Abstract
This article describes the work performed by ITU-T SG15Q13 for defining the first telecom profile based on the use of IEEE Std 1588-2008. The first profile is specifically developed for the distribution of frequency using unicast IPv4 transmission, and required adaptation of the IEEE1588 protocol to make it suitable for the telecom environment. The objectives, reasons, and results of this adaptation are explained in this article. Since the distribution of phase/time is also gaining importance in telecom, the article briefly discusses the objectives, reasons, and upcoming work for the definition of another profile that will leverage other functions and clocks defined in IEEE1588.
- Published
- 2010
19. Evaluation of Human Behavior in Collision Avoidance: A Study inside Immersive Virtual Reality
- Author
-
Michel Ouellette, Miguel Chagnon, and Jocelyn Faubert
- Subjects
Adult ,Male ,Engineering ,Motion Perception ,Poison control ,Walking ,Pedestrian ,Social Environment ,Personal Space ,User-Computer Interface ,Young Adult ,Personal space ,Orientation ,Avoidance Learning ,Reaction Time ,Immersion (virtual reality) ,Humans ,Computer Simulation ,Interpersonal Relations ,Motion perception ,Kinesthesis ,Applied Psychology ,Simulation ,ComputingMethodologies_COMPUTERGRAPHICS ,business.industry ,Social perception ,Distance Perception ,Communication ,Cognition ,General Medicine ,Collision ,Human-Computer Interaction ,Social Perception ,Female ,business ,Psychomotor Performance - Abstract
During our daily displacements, we should consider the individuals advancing toward us in order to avoid a possible collision with our congeneric. We developed an experimental design in a virtual immersion room, which allows us to evaluate human capacities for avoiding collisions with other people. In addition, the design allows participants to interact naturally inside this immersive virtual reality setup when a pedestrian is moving toward them, creating a possible risk of collision. Results suggest that the performance is associated with visual and motor capacities and could be adjusted by cognitive social perception.
- Published
- 2009
20. Limitations of current Ethernet switch architectures for enhanced flow control and service differentiation
- Author
-
James Aweya, Delfin Y. Montuno, and Michel Ouellette
- Subjects
Ethernet ,business.product_category ,Computer Networks and Communications ,business.industry ,Ethernet over PDH ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Ethernet flow control ,Computer Science Applications ,Synchronous Ethernet ,Network switch ,Ethernet over SDH ,business ,Connection-oriented Ethernet ,Carrier Ethernet ,Computer network - Abstract
One of the new challenges associated with full-duplex Ethernet is that of providing for network congestion control. The IEEE 802.3x Standard does not specify the switch architecture for implementing PAUSE flow control or at what point a MAC Control entity actually generates a PAUSE frame. This is an implementation issue that is product specific and as a result many different switch architectures are possible. There are also a number of limitations of the PAUSE flow control mechanism when implemented in Ethernet switches. These issues have not been adequately addressed in the literature. In addition, multimedia traffic such as real-time voice and streaming video are now being deployed over switched Ethernet networks, thus calling for congestion control with service differentiation for the various classes of traffic. Here we examine current Ethernet switch architectures and show that the PAUSE flow control when implemented in these architectures does not provide service selectivity and differentiation, making it unsuitable for real-time traffic.
- Published
- 2008
21. Design of rate-based controllers for active queue management in TCP/IP networks
- Author
-
Kent Felske, James Aweya, Michel Ouellette, and Delfin Y. Montuno
- Subjects
Computer Networks and Communications ,business.industry ,computer.internet_protocol ,Computer science ,Transmission Control Protocol ,Random early detection ,Active queue management ,Network topology ,law.invention ,TCP global synchronization ,Internet protocol suite ,Control theory ,law ,Control system ,Internet Protocol ,Telecommunications ,business ,Queue ,computer - Abstract
In our previous work [J. Aweya, M. Ouellette, D. Montuno, K. Felske, Rate-based proportional-integral control scheme for active queue management, International Journal of Network Management, John Wiley & Sons, Ltd., vol. 16, issue 3, May-June 2006, pp. 203-231] we argued that rate-based active queue management (AQM) schemes are most appropriate for high speed links which, typically, have small buffers in relation to the bandwidth-delay product of the link. We continue our discussion in this paper to study the performance of other rate-based AQM controllers. We consider integral (I) and proportional (P) rate-based controllers for the AQM problem, we then characterize all stabilizing feedback gains for the closed-loop TCP/AQM system. Using a network topology with short- and long-lived TCP flows, we present simulation results for the rate-based AQM controllers. We observe that the I-controller is able to control properly the system compared to the P-controller. The P-controller in most cases produces offsets from the target values. To further support our observations, we use a closed-loop control model and control theory to explain why the P-controller has major limitations in the control of a first-order plant like our TCP/AQM first-order plant.
- Published
- 2008
22. Synchronous ethernet: a method to transport synchronization
- Author
-
Stefano Ruffini, Mike Gilson, M. Mayer, Laurent Montini, Silvana Rodrigues, Michel Ouellette, Jean‐Loup Ferrant, and Sebastien Jobert
- Subjects
Ethernet ,Computer Networks and Communications ,Computer science ,Synchronous optical networking ,Resilient Packet Ring ,Synchronization ,RDMA over Converged Ethernet ,Electrical and Electronic Engineering ,Ethernet over SDH ,Connection-oriented Ethernet ,Carrier Ethernet ,Emulation ,Media Redundancy Protocol ,Ethernet Global Data Protocol ,Ethernet over PDH ,business.industry ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Ethernet flow control ,Physical layer ,Local area network ,Jumbo frame ,Metro Ethernet ,Computer Science Applications ,Backhaul (telecommunications) ,Synchronous Ethernet ,Autonegotiation ,business ,ATA over Ethernet ,Local Area Transport ,Computer network - Abstract
This article discusses the evolving transport architecture, covering some of the synchronization distribution problems to many endpoints where mobile backhaul and TDM emulation occur. It shows how synchronous Ethernet fits into both the Ethernet and synchronization architectures, and discusses how this helped development in standardization bodies. Standardization allows the key building blocks of Ethernet silicon and specific timing devices to be developed, which allows a robust system implementation to be constructed while allowing interworking with and migration from existing SONET/SDH-based transport infrastructure. Finally, results are shown that indicate a very high level of performance is achievable with Synchronous Ethernet not subject to the normal packet delay variation and traffic load conditions that can occur in packet based networks.
- Published
- 2008
23. French Town
- Author
-
Michel Ouellette and Michel Ouellette
- Abstract
«French Town» est une tragédie contemporaine. Elle met en scène la famille Bédard, qui représente l'expérience de la collectivité, illustre la subjectivité de la mémoire et expose le rapport entre la langue et l'identité. Les trois enfants adultes de Gilbert et Simone Bédard, Pierre-Paul, Cindy et Martin, rappellent l'histoire de leur famille dysfonctionnelle tout en envisageant leur vie après le décès de leur mère. Classique du répertoire francophone, «French Town» a remporté le prix du Gouverneur général en 1994. Cette nouvelle édition comprend des choix de jugements, une biographie et une bibliographie augmentés.
- Published
- 2014
24. Analysis of a clock-recovery technique for circuit emulation services over packet networks
- Author
-
James Aweya, Delfin Y. Montuno, Michel Ouellette, and Kent Felske
- Subjects
Computer Networks and Communications ,Electrical and Electronic Engineering - Published
- 2007
25. Parcours sous influence
- Author
-
Michel Ouellette
- Subjects
Visual Arts and Performing Arts - Abstract
Àdeux reprises dans les dernières années, j’ai eu l’occasion d’entendre des communications surmon oeuvre dans le cadre de colloques universitaires. Chaque fois, la sensation était étrange de se trouver dans une salle pour entendre un chercheur présenter le fruit de ses recherches surmon théâtre. C’était commeme regarder dans un miroir et découvrir de nouveaux aspects de mon visage.
- Published
- 2007
26. Clock synchronization for packet networks using a weighted least-squares error filtering technique and enabling circuit emulation service
- Author
-
Delfin Y. Montuno, Kent Felske, Michel Ouellette, and James Aweya
- Subjects
Synchronous circuit ,Computer Networks and Communications ,Clock domain crossing ,Computer science ,Real-time computing ,Clock drift ,Digital clock manager ,Self-clocking signal ,Electrical and Electronic Engineering ,Clock skew ,Clock synchronization ,Clock recovery - Abstract
Circuit emulation service (CES) allows time-division multiplexing (TDM) services (T1/E1 and T3/E3 circuits) to be transparently extended across a packet network. With circuit emulation over IP, for instance, TDM data received from an external device at the edge of an IP network is converted to IP packets, sent through the IP network, passed out of the IP network to its destination, and reassembled into TDM bit stream. Clock synchronization is very important for CES. This paper presents a clock synchronization scheme based on a double exponential filtering technique and a linear process model. The linear process model is used to describe the behaviour of clock synchronization errors between a transmitter and a receiver. In the clock synchronization scheme, the transmitter periodically sends explicit time indications or timestamps to a receiver to enable the receiver to synchronize its local clock to the transmitter's clock. A phase-locked loop (PLL) at the receiver processes the transmitted timestamps to generate timing signal for the receiver. The PLL has a simple implementation and provides both fast responsiveness (i.e. fast acquisition of transmitter frequency at a receiver) and significant jitter reduction in the locked state. Copyright © 2006 John Wiley & Sons, Ltd.
- Published
- 2007
27. A simple mechanism for stabilizing network queues in TCP/IP networks
- Author
-
James Aweya, Delfin Y. Montuno, and Michel Ouellette
- Subjects
Computer Networks and Communications ,business.industry ,Computer science ,computer.internet_protocol ,Linear model ,Stability (learning theory) ,Active queue management ,Computer Science Applications ,Nonlinear system ,Range (mathematics) ,Internet protocol suite ,Control theory ,Padé approximant ,business ,Queue ,computer ,Computer network - Abstract
In this paper we determine the stability bounds for the DRED active queue management (AQM) algorithm using a previously developed nonlinear dynamic model of TCP. We develop a second-order linear model with time delay by linearizing the nonlinear model. Using the Pade approximation of time-delayed system e-R0s, where R0 is the delay in the system, we then determine the range of stabilizing gains of DRED when controlling the second-order system with time delay R0. We also present examples showing the stability bounds of the DRED controller gain for networks with different parameters such as link capacity, load level, and round-trip time. In addition, we describe an efficient implementation of the DRED AQM algorithm.
- Published
- 2007
28. Clock recovery based on packet inter-arrival time averaging
- Author
-
Kent Felske, Michel Ouellette, James Aweya, and Delfin Y. Montuno
- Subjects
Synchronous circuit ,Computer Networks and Communications ,Network packet ,Computer science ,Real-time computing ,Clock skew ,Synchronization ,Clock synchronization ,Phase-locked loop ,Packet switching ,Circuit Emulation Service ,Digitally controlled oscillator ,Packet delay variation ,Clock recovery ,Jitter ,CPU multiplier - Abstract
Accurate source clock recovery is an important element of circuit emulation services (CES) over packet networks. A well-known and widely implemented technique for clock recovery in CES is the one that is based on packet inter-arrival time (sometimes called time difference of arrival (TDOA)) averaging. The technique is very simple to implement but provides good performance only when packet losses and packet delay variation (PDV) are very low and well controlled. This technique has not been fully characterized analytically in the literature. In this paper, we provide a full analytical examination of this well-known clock recovery technique. We analyze the effects of correlation of the PDV experienced by the constant bit rate (CBR) traffic stream on the quality of the clock recovered by a receiver. We prove analytically that, for a general input process, high correlation of the PDV produces a large variance of the recovered clock. The paper also describes simple all-digital implementations of the clock recovery scheme using standard digitally controlled oscillators (DCOs).
- Published
- 2006
29. Rate-based proportional–integral control scheme for active queue management
- Author
-
Delfin Y. Montuno, James Aweya, Michel Ouellette, and Kent Felske
- Subjects
Relation (database) ,Queue management system ,Computer Networks and Communications ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Control (management) ,Real-time computing ,Process (computing) ,Active queue management ,Computer Science Applications ,Network congestion ,Multilevel queue ,Control theory ,Queue - Abstract
Most high-speed links do not have adequate buffering and as a result Active Queue Management (AQM) schemes that utilize queue size information for congestion control cannot be effectively applied on these links. A high-speed link will, typically, have small buffers in relation to the bandwidth-delay product of the link. In this paper we argue that rate-based AQM schemes be used for such links. The goal here is to match the aggregate rate of the active TCP connections to the available capacity while maintaining minimal queue size and high link utilization. The AQM scheme described here employs a Proportional-Integral (PI) control strategy and explicitly takes into account the time delay in the control process.
- Published
- 2006
30. Relative loss rate differentiation: performance of short-lived TCP flows
- Author
-
Delfin Y. Montuno, James Aweya, and Michel Ouellette
- Subjects
Computer Networks and Communications ,Computer science ,business.industry ,TCP tuning ,Random early detection ,Active queue management ,Differentiated service ,TCP global synchronization ,Network congestion ,TCP Friendly Rate Control ,Electrical and Electronic Engineering ,business ,Queue ,Computer network - Abstract
The relative differentiated service model provides assurances for the relative quality ordering between service classes, rather than for the actual service level in each class. In this paper, we describe a relative loss rate differentiation scheme where packet drop probabilities are determined according to an active queue management (AQM) mechanism based on random early detection (RED) in a first-in first-out (FIFO) queue, are weighted in inverse proportion to the price that the network operator assigns to each service class. Basically, we describe a scheme where relative loss rate differentiation is incorporated directly into AQM. Most TCP flows today, particularly Web flows, can be characterized as short-lived flows. Using simulations with short-lived TCP flows, we show that the scheme is very effective in ensuring relative loss rate differentiation between service classes during times of network congestion. Copyright © 2004 John Wiley & Sons, Ltd.
- Published
- 2005
31. Clock synchronization using a linear process model
- Author
-
Delfin Y. Montuno, Kent Felske, Michel Ouellette, and James Aweya
- Subjects
Computer Networks and Communications ,Vector clock ,Computer science ,Clock drift ,Real-time computing ,Digital clock manager ,Clock synchronization ,Computer Science Applications ,Computer Science::Hardware Architecture ,Clock angle problem ,Clock domain crossing ,Self-clocking signal ,Computer Science::Information Theory ,CPU multiplier - Abstract
In this paper, we present a clock synchronization scheme based on a simple linear process model which describes the behaviors of clocks at a transmitter and a receiver. In the clock synchronization scheme, a transmitter sends explicit time indications or timestamps to a receiver, which uses them to synchronize its local clock to that of the transmitter. Here, it is assumed that there is no common network clock available to the transmitter and the receiver and, instead, the receiver relies on locking its clock to the arrival of the timestamps sent by the transmitter. The clock synchronization algorithm used by the receiver is based on a weighted least-squares criterion. Using this algorithm, the receiver observes and processes several consecutive clock samples (timestamps) to generate accurate timing signals. This algorithm is very efficient computationally, and requires the storage of only a small number of clock samples in order to generate accurate timing signals.
- Published
- 2005
32. Proportional loss rate differentiation in a FIFO queue
- Author
-
Michel Ouellette, James Aweya, and Delfin Y. Montuno
- Subjects
Queue management system ,Computer Networks and Communications ,FIFO (computing and electronics) ,Network packet ,Computer science ,business.industry ,Active queue management ,Differentiated service ,TCP congestion-avoidance algorithm ,Network congestion ,Packet loss ,business ,Queue ,Computer network - Abstract
The relative differentiated service model is one of several models proposed for service differentiation in networks [IEEE Network Sept/Oct (1999) 26]. In this model, an assurance is given that 'higher classes will be better, or at least no worse than lower classes.' This paper describes a relative loss rate differentiation scheme based on RED. The scheme is used for differentially dropping packets in a FIFO queue during times of congestion. The main idea is, if packet losses are unavoidable in the FIFO queuing system, then they should be distributed among the different service classes in the queue in inverse proportion to the service price or weight assigned to each class. The simulation studies using TCP traffic show that the scheme is very effective in ensuring relative loss rate differentiation between service classes.
- Published
- 2004
33. Design and Stability Analysis of a Rate Control Algorithm Using the Routh–Hurwitz Stability Criterion
- Author
-
Michel Ouellette, Delfin Y. Montuno, and James Aweya
- Subjects
Flow control (data) ,Computer Networks and Communications ,Computer science ,Stability criterion ,Node (networking) ,Rate control ,Networked control system ,Routh–Hurwitz stability criterion ,Computer Science Applications ,Network congestion ,Control theory ,Asynchronous Transfer Mode ,Electrical and Electronic Engineering ,Software - Abstract
Feedback delays arise in the control of a computer network--from the information transfer process itself and from the processing of control signals at the network nodes. Flow control of data sources in a computer network often results in a time-delayed control problem. Feedback delay reduces the stability of a system. In this paper we discuss how to use the Routh-Hurwitz stability criterion to design and analyze the stability of a flow control algorithm with feedback delay.
- Published
- 2004
34. Effects of control loop delay on the stability of a rate control algorithm
- Author
-
Delfin Y. Montuno, Michel Ouellette, and James Aweya
- Subjects
Network congestion ,Exponential stability ,Computer Networks and Communications ,Computer science ,Control system ,Process (computing) ,Electrical and Electronic Engineering ,Control (linguistics) ,Stability (probability) ,Algorithm ,Upper and lower bounds ,Domain (mathematical analysis) - Abstract
This paper presents exact stability analysis of a rate control algorithm described in Perform. Eval. 2001; 43(2–3):63–94; Int. J. Commun. Systems 2001; 14(6):593–618. The stability regions of the rate control process in the presence of control loop delay are analysed. The rate control process is represented by delay-difference equation and the criteria for asymptotic stability are derived in terms of the control parameters and control loop delay. The analysis shows that the approximate upper bound of the control gain derived in Aweya et al. is very close to the exact bound developed here. Using theoretical calculations performed in the discrete-time domain, we show that as the feedback time delay d increases, the intensity of control (i.e. the control gain α) must decrease in order for the system to remain stable. Copyright © 2004 John Wiley & Sons, Ltd.
- Published
- 2004
35. Circuit emulation services over Ethernet-Part 1: Clock synchronization using timestamps
- Author
-
Michel Ouellette, Kent Felske, James Aweya, and Delfin Y. Montuno
- Subjects
Computer Networks and Communications ,business.industry ,Ethernet over PDH ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Ethernet flow control ,Computer Science Applications ,Synchronous Ethernet ,RDMA over Converged Ethernet ,Ethernet over SDH ,business ,ATA over Ethernet ,Connection-oriented Ethernet ,Computer network ,Carrier Ethernet - Abstract
Due to Ethernet's ubiquity, simplicity, scalability and cost effectiveness there is significant customer demand for Ethernet-based access and transport in the metropolitan network. Many service providers have recognized this need and are currently establishing Ethernet-based services to meet this demand. The migration to all-Ethernet access will not be instantaneous since many customers currently have legacy TDM access interfaces on their routers and PBX equipment. Circuit Emulation Services (CES) over Ethernet provides TDM circuit emulation to support TDM traffic such as T1/E1, T3/E3, OC3/12, etc. This two-part paper presents the application of CES over Ethernet as well as a new technology that addresses the issues associated with clock recovery and synchronization in an Ethernet network with its inherent network jitter. Part 1 describes a clock synchronization technique where a transmitter periodically sends explicit time indications or timestamps to a receiver to enable the receiver to synchronize its local clock to the transmitter's clock.
- Published
- 2004
36. DRED-MP: Queue management with multiple levels of drop precedence
- Author
-
Michel Ouellette, James Aweya, Abel C. Dasylva, and Delfin Y. Montuno
- Subjects
Queue management system ,Computer Networks and Communications ,Computer science ,business.industry ,Network packet ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Packet forwarding ,Differentiated service ,Active queue management ,Computer Science Applications ,Multilevel queue ,Packet drop attack ,business ,Queue ,Computer network - Abstract
There is current interest in differentiated service architectures where packets with different priorities can share the same queue. In the case of congestion, packets marked with higher drop probability are preferentially dropped in order to make buffer room for packets marked with lower drop probability. Active queue management (AQM) based on randomized packet dropping has become a key component of this packet forwarding model. This paper extends our previously developed AQM algorithm called DRED with multiple packet drop precedence to allow for priority treatment of traffic in a network. The main advantage of using the DRED algorithm is the lower parameter configuration complexity it offers and the ease of configuration for a wide range of network conditions.
- Published
- 2004
37. Circuit emulation services over Ethernet-Part 2: Prototype and experimental results
- Author
-
Michel Ouellette, James Aweya, Kent Felske, Karin Sundstrom, Delfin Y. Montuno, and Jeganathan Markandu
- Subjects
Scheme (programming language) ,Data stream ,Ethernet ,Computer Networks and Communications ,business.industry ,Computer science ,Clock synchronization ,Computer Science Applications ,Packet loss ,Embedded system ,Synchronization (computer science) ,TDMoIP ,business ,computer ,computer.programming_language ,Jitter - Abstract
This paper describes a prototype implementation and experimental results for unstructured circuit emulation service (UCES) of T3 data stream over Ethernet. As explained in Part 1 of this paper, packet-switched networks such as Ethernet are not designed to transport TDM data and so have no inherent clock distribution and synchronization mechanisms. Thus, to allow the frequency of the source TDM stream to be regenerated at the receiver, the prototype employed the clock synchronization scheme described in Part 1 of this paper. Our experiments showed that the recovered clock conforms to ITU-T G.824 requirements even for networks that introduce high jitter and packet loss.
- Published
- 2004
38. Capitaine Baboune
- Author
-
Michel Ouellette, Réjean Roy, Michel Ouellette, and Réjean Roy
- Abstract
Tandis que son grand frère Arnaud boude, Loïc, le coeur content, joue dans la neige. Soudain, une tempête de gros nuages noirs s'abat sur eux et aspire Arnaud dans le ciel. Loïc veut aller chercher du secours auprès des adultes, mais le dragon Portagne des Montagnes surgit. Portagne sait comment procéder. Il faut poursuivre le capitaine Baboune, qui vient d'enlever Arnaud sur son étrange bateau volant. En effet, L'Étoile noire de Baboune carbure aux querelles et aux ronchonnements des enfants matelots captifs. Pour libérer Arnaud, Loïc doit convaincre l'équipage de se mutiner…
- Published
- 2013
39. Requiem suivi de Fausse route
- Author
-
Michel Ouellette and Michel Ouellette
- Abstract
« Requiem » : Trois êtres convulsifs, hantés par la vie, trois prières rageuses et amoureuses pour qu'advienne le repos, que s'apaisent les blessures et que, au terme de la douleur, chante enfin la beauté... « Fausse route » : Road movie théâtral au ton irrévérencieux, cette comédie grinçante met en scène cinq personnages porteurs de drames intérieurs dissimulés sous les quarts de vérité et les demi-mensonges. Désir, jalousie, rejet, pouvoir, errance, création, mémoire : les fausses pistes se multiplient jusqu'à la troublante conclusion.
- Published
- 2013
40. ABC démolition
- Author
-
Michel Ouellette and Michel Ouellette
- Abstract
Au centre d'un village qui se meurt, une enseignante s'est barricadée à l'intérieur de l'école, une ceinture de dynamite autour du ventre. Elle tente d'empêcher que « son » école soit démolie. Ironie, c'est le démolisseur, Jeff, qui tente de la dissuader de tout faire sauter. Entre les deux, un jeu de lettres qui tient lieu de compte à rebours...
- Published
- 2013
41. Corbeaux en exil
- Author
-
Michel Ouellette and Michel Ouellette
- Abstract
Corbeaux en exil met en scène un auteur. Mais l'auteur n'est pas le seul personnage à la recherche dans un reflet son identité. À la quête de l'écriture se substitue une quête du passé, d'une filiation problématique dont la principale inspiratrice et sa propre mère. C'est à la demande de cette dernière que se met en branle le douloureux voyage du souvenir, la recherche d'un grand-père dont il est à la fois le double et l'héritier. Au cours de cette remontée dans le temps, les voix féminines de sa famille le guideront pour mieux tenter de le retenir dans sa fuite du réel, exil personnel qui est aussi celui de toute une culture, de tout un peuple. Les enjeux du texte sont multiples, personnels et collectifs. Mais ils sont remarquablement dramatisés dans une orchestration nom seulement du temps et de l'espace, mais aussi du jeu. Les comédiens accompagnent, par la permutation des rôles, le parcours d'un auteur toujours menacé de se voir supplanté par ses propres personnages. C'est dire que la mise en lecture éclaire singulièrement l'originalité d'une écriture qui ne puisse pas sa force dans la complexité du décor ou de la scénographie.
- Published
- 2013
42. La dernière fugue suivi de Duel et de King Edward
- Author
-
Michel Ouellette and Michel Ouellette
- Abstract
Trois pièces de Michel Ouellette. « La Dernière fugue » : Charles, coincé dans le plancher, son grand-père Fred, vieillard bardé d'un brassard à croix gammée, son amie Mimi, écrivaine surgie en bikini d'un immense gâteau: trois êtres qui amalgament passé et présent, fiction et réalité, en une quête vertigineuse où chacun pourchasse ses origines et fouille son identité. « Duel » : Blanche refuse d'aller plus loin dans la pièce qu'elle répète avec Édouard. Elle appelait celui-ci « Heidi » et lui faisait porter des robes car elle aurait aimé qu'Édouard fût une fille, mais un jour celui-ci a retrouvé sa véritable identité. « King Edward » : Le fils du bon docteur Roy, Édouard, pressenti pour reprendre le flambeau de ce grand défenseur du fait français à Ottawa, voit sa carrière politique compromise. Il s'est amouraché d'une femme mariée qui le repousse malgré leur amour secret. En retrouvant l'assassin de son père, Édouard comprend que ce dernier a péri parce qu'il vivait aussi un amour interdit.
- Published
- 2013
43. Le Bateleur
- Author
-
Michel Ouellette and Michel Ouellette
- Abstract
C'est un jour de tempête. La neige et le vent sifflent au travers du corps de ceux qui s'aventurent dehors. Seul dans son hôtel, les mains et le cœur brisés, Jack attend l'arrivée d'Éliza, la serveuse qu'il rêve d'épouser. C'est un jour de tempête et Jack est aux prises avec Dempsey, la voix qui lui déchire l'intérieur. Puis apparaîtra l'étranger qui le fera basculer dans un face-à-face avec sa passion et son passé. Une histoire de désir. Désir de vaincre. Désir d'aimer. Désir d'être aimé.
- Published
- 2013
44. A multi-queue TCP window control scheme with dynamic buffer allocation
- Author
-
James Aweya, Delfin Y. Montuno, and Michel Ouellette
- Subjects
TCP acceleration ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,TCP delayed acknowledgment ,TCP global synchronization ,TCP Westwood plus ,TCP Friendly Rate Control ,Hardware and Architecture ,Zeta-TCP ,Compound TCP ,business ,TCP window scale option ,Software ,Computer network - Abstract
Explicit transmission control protocol (TCP) window control through the modification of the receiver’s advertised window in ACK packets is one of the ways intermediate network elements can contribute to the end-to-end TCP control. The TCP receiver’s advertised window, which indicates the level of the receive buffer of a TCP connection, limits the maximum window and consequently the throughput that can be achieved by the TCP sender. Thus, appropriate reduction of the advertised window by intermediate network elements can control the number of packets sent from a TCP sender. This paper describes a TCP window control scheme for a shared memory system with multiple queues. A dynamic buffer threshold, computed using a simple recursive algorithm, is used to dynamically allocate buffer space to the queues.
- Published
- 2003
45. Active queue management with flow proportional buffering
- Author
-
Michel Ouellette, James Aweya, and Delfin Y. Montuno
- Subjects
Queue management system ,Computer Networks and Communications ,Computer science ,business.industry ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Active queue management ,Multilevel feedback queue ,Computer Science Applications ,TCP global synchronization ,Network congestion ,Multilevel queue ,Weighted random early detection ,business ,Queue ,Computer network - Abstract
Most active queue management schemes maintain an average of the queue length which they use together with a number of queue thresholds to detect congestion. However, the setting of the queue thresholds is problematic because the required buffer size for good sharing among TCP connections is dependent on the number of TCP connections using the buffer. This paper describes an improved active queue management scheme which dynamically changes its threshold settings as the number of connections and system load changes. This technique allows network devices to effectively control packet losses and TCP timeouts while maintaining high link utilization.
- Published
- 2003
46. Explicit TCP window adaptation in a shared memory architecture
- Author
-
Delfin Y. Montuno, James Aweya, and Michel Ouellette
- Subjects
Queueing theory ,Computer Networks and Communications ,business.industry ,Network packet ,Computer science ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Network congestion ,Out-of-order delivery ,TCP Friendly Rate Control ,Shared memory ,Electrical and Electronic Engineering ,business ,TCP window scale option ,Queue ,Computer network - Abstract
A multiple (priority) queueing system allows a network node to manage the queueing of packets in such a way that higher priority packets will always be served first, low priority packets will be discarded when the queue is full, and for same-priority packets any interference between them will be prevented. This paper describes a TCP window control scheme for a shared memory device that has buffer memory logically organized into multiple queues. To handle changing queue traffic loads, the shared memory device uses a dynamic buffer threshold mechanism to allocate buffer space to the queues. The TCP window control scheme allows the receiver's advertised window size in ACK packets to be modified at the network queue in order to maintain the queue size at a computed dynamic threshold. Copyright © 2003 John Wiley & Sons, Ltd.
- Published
- 2003
47. Using TCP rate control for queue input-output rate matching
- Author
-
Michel Ouellette, Delfin Y. Montuno, and James Aweya
- Subjects
CUBIC TCP ,TCP acceleration ,Computer Networks and Communications ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Real-time computing ,TCP delayed acknowledgment ,TCP global synchronization ,TCP Friendly Rate Control ,TCP Westwood plus ,Zeta-TCP ,Compound TCP ,Electrical and Electronic Engineering ,business ,Computer network - Abstract
In explicit TCP rate control, the receiver's advertised window size in acknowledgment (ACK) packets can be modified by intermediate network elements to reflect network congestion conditions. The TCP receiver's advertised window (i.e. the receive buffer of a TCP connection) limits the maximum window and consequently the throughput that can be achieved by the sender. Appropriate reduction of the advertised window can control the number of packets allowed to be sent from a TCP source. This paper evaluates the performance of a TCP rate control scheme in which the receiver's advertised window size in ACK packets are modified in a network node in order to match the generated load to the assigned bandwidth in the node. Using simulation and performance metrics such as the packet loss rates and the cumulative number of TCP timeouts, we examine the service improvement provided by the TCP rate control scheme to the users. The modified advertised windows computed in the network elements and the link utilization are also examined. Copyright © 2002 John Wiley & Sons, Ltd.
- Published
- 2002
48. TCP rate control with dynamic buffer sharing
- Author
-
Delfin Y. Montuno, James Aweya, and Michel Ouellette
- Subjects
CUBIC TCP ,TCP acceleration ,Computer Networks and Communications ,Computer science ,Transmission Control Protocol ,Distributed computing ,TCP tuning ,TCP delayed acknowledgment ,Throughput ,H-TCP ,TCP congestion-avoidance algorithm ,TCP Friendly Rate Control ,TCP Westwood plus ,Zeta-TCP ,Network performance ,Queue ,business.industry ,Network packet ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Networking hardware ,TCP global synchronization ,Network congestion ,Compound TCP ,business ,BIC TCP ,Computer network ,Buffer underrun ,TCP pacing - Abstract
The transmission control protocol (TCP) receiver's advertised window (i.e. the receive buffer of a TCP connection) limits the maximum window and consequently the throughput that can be achieved by the sender. Thus, the idea behind the technique generally known as 'TCP rate control' is to match the offered network load to the available resources by modifying at an intermediate network device, the receiver's advertised window in TCP acknowledgments returning to the sources. In this paper, we propose a new TCP rate control scheme for a shared buffer where the buffer is logically organized into multiple queues. In the scheme, a dynamic buffer threshold is used to ensure efficient and fair usage of buffer memory among the queues. Conventional schemes allocate buffer space to each queue through the use of static buffer thresholds. This can result in unnecessary packet drops which lead to poor network performance since congested or heavily loaded queues cannot gain access to buffers not utilized by lightly loaded queues.
- Published
- 2002
49. A comparison of active queue management algorithms using the OPNET Modeler
- Author
-
Chengyu Zhu, James Aweya, Delfin Y. Montuno, O.W.W. Yang, and Michel Ouellette
- Subjects
Queueing theory ,Queue management system ,Computer Networks and Communications ,Network packet ,Computer science ,business.industry ,Distributed computing ,Random early detection ,Active queue management ,Computer Science Applications ,TCP global synchronization ,Traffic intensity ,Packet switching ,Network performance ,Electrical and Electronic Engineering ,business ,Algorithm ,Queue ,Computer network - Abstract
A number of active queue management algorithms for TCP/IP networks such as random early detection (RED), stabilized RED (SRED), BLUE, and dynamic RED (DRED) have been proposed in the past few years. This article presents a comparative study of these algorithms using simulations. The evaluation is done using the OPNET Modeler, which provides a convenient and easy-to-use platform for simulating large-scale networks. The performance metrics used in the study are queue size, packet drop probability, and packet loss rate. The study shows that, among the four algorithms, SIZED and DRED are more effective at stabilizing the queue size and controlling the packet loss rate while maintaining high link utilization. The benefits of stabilized queues in a network are high resource utilization, bounded delays, more certain buffer provisioning, and,traffic-load-independent network performance in terms of traffic intensity and number of TCP connections.
- Published
- 2002
50. Multi-level active queue management with dynamic thresholds
- Author
-
James Aweya, Delfin Y. Montuno, and Michel Ouellette
- Subjects
Router ,Queue management system ,Computer Networks and Communications ,Computer science ,business.industry ,Network packet ,Distributed computing ,Random early detection ,Active queue management ,Networking hardware ,Network congestion ,Circular buffer ,Network performance ,business ,Queue ,Computer network - Abstract
In this paper, we propose a new active queue management scheme for a network device (e.g. router, switch, etc.) with a shared buffer where the buffer is logically organized into multiple queues. Conventional schemes allocate buffer space to each queue through the use of static buffer thresholds. Although very simple, these static thresholds are often determined using simple heuristics and cannot adapt to changing traffic conditions. These schemes could also result in unnecessary packet drops which lead to poor network performance since congested or heavily loaded queues cannot gain access to buffers not utilized by the lightly loaded queues. The proposed active queue management scheme, which uses dynamic buffer thresholds, adapts to changing load conditions and dynamically allocates buffer space to all queues using a simple recursive algorithm. The implementation of the scheme is also simple and requires low processing overhead to compute the dynamic buffer thresholds and packet drop probabilities.
- Published
- 2002
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.