(2008) examined the impact of FDI inflows into Vietnam from 23 other countries during the period 1990-2004 to assess the impact of FDI on Vietnam's exports. The estimated results showed that FDI is an important factor in promoting Vietnam's export growth rate. Specifically, the authors pointed out that a 1% increase in FDI inflows will increase Vietnam's exports by 0.13%. Similarly, Anwar and Nguyen (2011a) studied the impact of FDI on Vietnam's import and export activities, based on the gravity model and using panel data on Vietnam's trade with 19 of its most important partners. This study showed that FDI inflows had a positive impact on both Vietnam's export and import values during the period 1990-2007. At the same time, the authors also found evidence of a positive correlation between FDI inflows and Vietnam's net export value in the post-1997 Asian financial crisis period.
At the provincial/municipal level , Zhang and Song (2001) used data from 3 cities and 24 provinces in China during the period 1986-1997 to examine the impact of FDI inflows on export value. The GLS regression results showed that FDI encouraged export activities and contributed to increasing the export value of Chinese provinces.
For activities participating in global supply chains at the enterprise level, the presence of FDI enterprises is often expected to have an impact on the import and export decisions of domestic enterprises through both competitive effects and knowledge spillover effects. FDI enterprises are subsidiaries of multinational corporations (MNCs) with experience and knowledge of operations in foreign markets as well as marketing, distribution and customer service networks that can help domestic enterprises through the transfer of market information and technology (Greenaway et al., 2004). As a result, enterprises in the host country have better opportunities to participate in global supply chains. In addition, linking with FDI enterprises helps domestic enterprises to promote production specialization activities, thereby achieving international product standards and enhancing product export opportunities (Sheng et al., 2011).
According to Aitken et al. (1997), FDI enterprises can help domestic enterprises grasp information about foreign tastes and markets, and at the same time promote infrastructure improvements, thereby creating conditions for domestic enterprises to easily participate in export markets. Using data on Mexican manufacturing enterprises in the period 1986-1990 with a Probit regression model, Aitken et al. (1997) examined
Maybe you are interested!
-
Qos Assurance Methods for Multimedia Communications
zt2i3t4l5ee
zt2a3gs
zt2a3ge
zc2o3n4t5e6n7ts
low. The EF PHB requires a sufficiently large number of output ports to provide low delay, low loss, and low jitter.
EF PHBs can be implemented if the output port's bandwidth is sufficiently large, combined with small buffer sizes and other network resources dedicated to EF packets, to allow the router's service rate for EF packets on an output port to exceed the arrival rate λ of packets at that port.
This means that packets with PHB EF are considered with a pre-allocated amount of output bandwidth and a priority that ensures minimum loss, minimum delay and minimum jitter before being put into operation.
PHB EF is suitable for channel simulation, leased line simulation, and real-time services such as voice, video without compromising on high loss, delay and jitter values.
Figure 2.10 Example of EF installation
Figure 2.10 shows an example of an EF PHB implementation. This is a simple priority queue scheduling technique. At the edges of the DS domain, EF packet traffic is prioritized according to the values agreed upon by the SLA. The EF queue in the figure needs to output packets at a rate higher than the packet arrival rate λ. To provide an EF PHB over an end-to-end DS domain, bandwidth at the output ports of the core routers needs to be allocated in advance to ensure the requirement μ > λ. This can be done by a pre-configured provisioning process. In the figure, EF packets are placed in the priority queue (the upper queue). With such a length, the queue can operate with μ > λ.
Since EF was primarily used for real-time services such as voice and video, and since real-time services use UDP instead of TCP, RED is generally
not suitable for EF queues because applications using UDP will not respond to random packet drop and RED will strip unnecessary packets.
2.2.4.2 Assured Forwarding (AF) PHB
PHB AF is defined by RFC 2597. The purpose of PHB AF is to deliver packets reliably and therefore delay and jitter are considered less important than packet loss. PHB AF is suitable for non-real-time services such as applications using TCP. PHB AF first defines four classes: AF1, AF2, AF3, AF4. For each of these AF classes, packets are then classified into three subclasses with three distinct priority levels.
Table 2.8 shows the four AF classes and 12 AF subclasses and the DSCP values for the 12 AF subclasses defined by RFC 2597. RFC 2597 also allows for more than three separate priority levels to be added for internal use. However, these separate priority levels will only have internal significance.
PHB Class
PHB Subclass
Package type
DSCP
AF4
AF41
Short
100010
AF42
Medium
100100
AF43
High
100110
AF3
AF31
Short
011010
AF32
Medium
011100
AF33
High
011110
AF2
AF21
Short
010010
AF22
Medium
010100
AF23
High
010110
AF1
AF11
Short
001010
AF12
Medium
001100
AF13
High
001110
Table 2.8 AF DSCPs
The AF PHB ensures that packets are forwarded with a high probability of delivery to the destination within the bounds of the rate agreed upon in an SLA. If AF traffic at an ingress port exceeds the pre-priority rate, which is considered non-compliant or “out of profile”, the excess packets will not be delivered to the destination with the same probability as the packets belonging to the defined traffic or “in profile” packets. When there is network congestion, the out of profile packets are dropped before the in profile packets are dropped.
When service levels are defined using AF classes, different quantity and quality between AF classes can be realized by allocating different amounts of bandwidth and buffer space to the four AF classes. Unlike
EF, most AF traffic is non-real-time traffic using TCP, and the RED queue management strategy is an AQM (Adaptive Queue Management) strategy suitable for use in AF PHBs. The four AF PHB layers can be implemented as four separate queues. The output port bandwidth is divided into four AF queues. For each AF queue, packets are marked with three “colors” corresponding to three separate priority levels.
In addition to the 32 DSCP 1 groups defined in Table 2.8, 21 DSCPs have been standardized as follows: one for PHB EF, 12 for PHB AF, and 8 for CSCP. There are 11 DSCP 1 groups still available for other standards.
2.2.5.Example of Differentiated Services
We will look at an example of the Differentiated Service model and mechanism of operation. The architecture of Differentiated Service consists of two basic sets of functions:
Edge functions: include packet classification and traffic conditioning. At the inbound edge of the network, incoming packets are marked. In particular, the DS field in the packet header is set to a certain value. For example, in Figure 2.12, packets sent from H1 to H3 are marked at R1, while packets from H2 to H4 are marked at R2. The labels on the received packets identify the service class to which they belong. Different traffic classes receive different services in the core network. The RFC definition uses the term behavior aggregate rather than the term traffic class. After being marked, a packet can be forwarded immediately into the network, delayed for a period of time before being forwarded, or dropped. We will see that there are many factors that affect how a packet is marked, and whether it is forwarded immediately, delayed, or dropped.
Figure 2.12 DiffServ Example
Core functionality: When a DS-marked packet arrives at a Diffservcapable router, the packet is forwarded to the next router based on
Per-hop behavior is associated with packet classes. Per-hop behavior affects router buffers and the bandwidth shared between competing classes. An important principle of the Differentiated Service architecture is that a router's per-hop behavior is based only on the packet's marking or the class to which it belongs. Therefore, if packets sent from H1 to H3 as shown in the figure receive the same marking as packets from H2 to H4, then the network routers treat the packets exactly the same, regardless of whether the packet originated from H1 or H2. For example, R3 does not distinguish between packets from h1 and H2 when forwarding packets to R4. Therefore, the Differentiated Service architecture avoids the need to maintain router state about separate source-destination pairs, which is important for network scalability.
Chapter Conclusion
Chapter 2 has presented and clarified two main models of deploying and installing quality of service in IP networks. While the traditional best-effort model has many disadvantages, later models such as IntServ and DiffServ have partly solved the problems that best-effort could not solve. IntServ follows the direction of ensuring quality of service for each separate flow, it is built similar to the circuit switching model with the use of the RSVP resource reservation protocol. IntSer is suitable for services that require fixed bandwidth that is not shared such as VoIP services, multicast TV services. However, IntSer has disadvantages such as using a lot of network resources, low scalability and lack of flexibility. DiffServ was born with the idea of solving the disadvantages of the IntServ model.
DiffServ follows the direction of ensuring quality based on the principle of hop-by-hop behavior based on the priority of marked packets. The policy for different types of traffic is decided by the administrator and can be changed according to reality, so it is very flexible. DiffServ makes better use of network resources, avoiding idle bandwidth and processing capacity on routers. In addition, the DifServ model can be deployed on many independent domains, so the ability to expand the network becomes easy.
Chapter 3: METHODS TO ENSURE QoS FOR MULTIMEDIA COMMUNICATIONS
In packet-switched networks, different packet flows often have to share the transmission medium all the way to the destination station. To ensure the fair and efficient allocation of bandwidth to flows, appropriate serving mechanisms are required at network nodes, especially at gateways or routers, where many different data flows often pass through. The scheduler is responsible for serving packets of the selected flow and deciding which packet will be served next. Here, a flow is understood as a set of packets belonging to the same priority class, or originating from the same source, or having the same source and destination addresses, etc.
In normal state when there is no congestion, packets will be sent as soon as they are delivered. In case of congestion, if QoS assurance methods are not applied, prolonged congestion can cause packet drops, affecting service quality. In some cases, congestion is prolonged and widespread in the network, which can easily lead to the network being "frozen", or many packets being dropped, seriously affecting service quality.
Therefore, in this chapter, in sections 3.2 and 3.3, we introduce some typical network traffic load monitoring techniques to predict and prevent congestion before it occurs through the measure of dropping (removing) packets early when there are signs of impending congestion.
3.1. DropTail method
DropTail is a simple, traditional queue management method based on FIFO mechanism. All incoming packets are placed in the queue, when the queue is full, the later packets are dropped.
Due to its simplicity and ease of implementation, DropTail has been used for many years on Internet router systems. However, this algorithm has the following disadvantages:
− Cannot avoid the phenomenon of “Lock out”: Occurs when 1 or several traffic streams monopolize the queue, making packets of other connections unable to pass through the router. This phenomenon greatly affects reliable transmission protocols such as TCP. According to the anti-congestion algorithm, when locked out, the TCP connection stream will reduce the window size and reduce the packet transmission speed exponentially.
− Can cause Global Synchronization: This is the result of a severe “Lock out” phenomenon. Some neighboring routers have their queues monopolized by a number of connections, causing a series of other TCP connections to be unable to pass through and simultaneously reducing the transmission speed. After those monopolized connections are temporarily suspended,
Once the queue is cleared, it takes a considerable amount of time for TCP connections to return to their original speed.
− Full Queue phenomenon: Data transmitted on the Internet often has an explosion, packets arriving at the router are often in clusters rather than in turn. Therefore, the operating mechanism of DropTail makes the queue easily full for a long period of time, leading to the average delay time of large packets. To avoid this phenomenon, with DropTail, the only way is to increase the router's buffer, this method is very expensive and ineffective.
− No QoS guarantee: With the DropTail mechanism, there is no way to prioritize important packets to be transmitted through the router earlier when all are in the queue. Meanwhile, with multimedia communication, ensuring connection and stable speed is extremely important and the DropTail algorithm cannot satisfy.
The problem of choosing the buffer size of the routers in the network is to “absorb” short bursts of traffic without causing too much queuing delay. This is necessary in bursty data transmission. The queue size determines the size of the packet bursts (traffic spikes) that we want to be able to transmit without being dropped at the routers.
In IP-based application networks, packet dropping is an important mechanism for indirectly reporting congestion to end stations. A solution that prevents router queues from filling up while reducing the packet drop rate is called dynamic queue management.
3.2. Random elimination method – RED
3.2.1 Overview
RED (Random Early Detection of congestion; Random Early Drop) is one of the first AQM algorithms proposed in 1993 by Sally Floyd and Van Jacobson, two scientists at the Lawrence Berkeley Laboratory of the University of California, USA. Due to its outstanding advantages compared to previous queue management algorithms, RED has been widely installed and deployed on the Internet.
The most fundamental point of their work is that the most effective place to detect congestion and react to it is at the gateway or router.
Source entities (senders) can also do this by estimating end-to-end delay, throughput variability, or the rate of packet retransmissions due to drop. However, the sender and receiver view of a particular connection cannot tell which gateways on the network are congested, and cannot distinguish between propagation delay and queuing delay. Only the gateway has a true view of the state of the queue, the link share of the connections passing through it at any given time, and the quality of service requirements of the
traffic flows. The RED gateway monitors the average queue length, which detects early signs of impending congestion (average queue length exceeding a predetermined threshold) and reacts appropriately in one of two ways:
− Drop incoming packets with a certain probability, to indirectly inform the source of congestion, the source needs to reduce the transmission rate to keep the queue from filling up, maintaining the ability to absorb incoming traffic spikes.
− Mark “congestion” with a certain probability in the ECN field in the header of TCP packets to notify the source (the receiving entity will copy this bit into the acknowledgement packet).
Figure 3. 1 RED algorithm
The main goal of RED is to avoid congestion by keeping the average queue size within a sufficiently small and stable region, which also means keeping the queuing delay sufficiently small and stable. Achieving this goal also helps: avoid global synchronization, not resist bursty traffic flows (i.e. flows with low average throughput but high volatility), and maintain an upper bound on the average queue size even in the absence of cooperation from transport layer protocols.
To achieve the above goals, RED gateways must do the following:
− The first is to detect congestion early and react appropriately to keep the average queue size small enough to keep the network operating in the low latency, high throughput region, while still allowing the queue size to fluctuate within a certain range to absorb short-term fluctuations. As discussed above, the gateway is the most appropriate place to detect congestion and is also the most appropriate place to decide which specific connection to report congestion to.
− The second thing is to notify the source of congestion. This is done by marking and notifying the source to reduce traffic. Normally the RED gateway will randomly drop packets. However, if congestion
If congestion is detected before the queue is full, it should be combined with packet marking to signal congestion. The RED gateway has two options: drop or mark; where marking is done by marking the ECN field of the packet with a certain probability, to signal the source to reduce the traffic entering the network.
− An important goal that RED gateways need to achieve is to avoid global synchronization and not to resist traffic flows that have a sudden characteristic. Global synchronization occurs when all connections simultaneously reduce their transmission window size, leading to a severe drop in throughput at the same time. On the other hand, Drop Tail or Random Drop strategies are very sensitive to sudden flows; that is, the gateway queue will often overflow when packets from these flows arrive. To avoid these two phenomena, gateways can use special algorithms to detect congestion and decide which connections will be notified of congestion at the gateway. The RED gateway randomly selects incoming packets to mark; with this method, the probability of marking a packet from a particular connection is proportional to the connection's shared bandwidth at the gateway.
− Another goal is to control the average queue size even without cooperation from the source entities. This can be done by dropping packets when the average size exceeds an upper threshold (instead of marking it). This approach is necessary in cases where most connections have transmission times that are less than the round-trip time, or where the source entities are not able to reduce traffic in response to marking or dropping packets (such as UDP flows).
3.2.2 Algorithm
This section describes the algorithm for RED gateways. RED gateways calculate the average queue size using a low-pass filter. This average queue size is compared with two thresholds: minth and maxth. When the average queue size is less than the lower threshold, no incoming packets are marked or dropped; when the average queue size is greater than the upper threshold, all incoming packets are dropped. When the average queue size is between minth and maxth, each incoming packet is marked or dropped with a probability pa, where pa is a function of the average queue size avg; the probability of marking or dropping a packet for a particular connection is proportional to the bandwidth share of that connection at the gateway. The general algorithm for a RED gateway is described as follows: [5]
For each packet arrival
Caculate the average queue size avg If minth ≤ avg < maxth
div.maincontent .s1 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 15pt; }
div.maincontent .s2 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 15pt; }
div.maincontent .p { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; margin:0pt; }
div.maincontent p { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; margin:0pt; }
div.maincontent .s3 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 14pt; }
div.maincontent .s4 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; }
div.maincontent .s5 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: normal; text-decoration: none; font-size: 14pt; }
div.maincontent .s6 { color: black; font-family:"Times New Roman", serif; font-style: italic; font-weight: bold; text-decoration: none; font-size: 14pt; }
div.maincontent .s7 { color: black; font-family:Wingdings; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; }
div.maincontent .s8 { color: black; font-family:Arial, sans-serif; font-style: italic; font-weight: bold; text-decoration: none; font-size: 15pt; }
div.maincontent .s9 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 14pt; }
div.maincontent .s10 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 9pt; vertical-align: 6pt; }
div.maincontent .s11 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 13pt; }
div.maincontent .s12 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 10pt; }
div.maincontent .s13 { color: black; font-family:"Times New Roman", serif; font-style: normal; font-weight: normal; text-d -
Factors affecting the cooperative relationship of travel companies with suppliers in the tourism supply chain - 1 -
Research on factors affecting the decision to purchase gypsum board of Huy An private trading enterprise from institutional customers in Ho Chi Minh City - 13 -
Research on factors affecting the behavior of using international bank cards in Vietnam - 21 -
Research Contents Identify Factors Affecting Slow Growth In The Study.
The impact of the FDI sector on the performance of domestic enterprises. The regression results show that the closer domestic enterprises operate to FDI enterprises, the higher their export potential. The authors also propose the construction of export processing zones to facilitate import and export taxes as well as support infrastructure for enterprises, thereby helping enterprises reduce the costs of entering the export market.

Kokko et al. (2001) also examined the spillover effect of the FDI sector on manufacturing exports in Uruguay. Using data from 1,243 enterprises in 1988, the authors built a probit regression model with variables reflecting the characteristics of enterprises, industry characteristics as well as a variable representing the level of linkage/presence of FDI enterprises at the industry level. The research results show that the level of linkage of FDI enterprises established after 1973 (when Uruguay began to promote outward-looking activities) has a positive impact on the export capacity of enterprises, while there is no evidence of the influence of FDI enterprises established before 1972.
Greenaway et al. (2004) examined the impact of FDI on the export of domestic enterprises in the United Kingdom using data from 1992 to 1996. The Heckman two-step regression model showed similar conclusions as Aitken et al. (1997) when linkages with FDI enterprises were shown to help domestic enterprises grasp information about foreign markets, thereby promoting the export activities of enterprises.
Similarly, the study by Kneller and Pisu (2007) used data on manufacturing enterprises in the UK during the period 1992-1999 to examine the impact of linkages with FDI enterprises on the exports of enterprises. The authors found that, not only affecting the exports of enterprises in the same industry, FDI enterprises can also affect the exports of enterprises in other industries through vertical linkages. The quantitative model of the authors is based on the Heckman 2-step regression technique as studied by Greenway et al. (2004). The authors pointed out that the presence of FDI enterprises in the same industry and region contributes to promoting the export decisions of enterprises. At the same time, export-oriented FDI enterprises also bring about greater spillover effects. Not only that, the research results also show that FDI enterprises in downstream industries have a positive impact on the export output ratio of domestic enterprises. This is explained as, when FDI enterprises in the downstream use inputs from
Domestic enterprises can bring opportunities for domestic enterprises to improve their competitiveness and product quality, thereby promoting export activities.
Ruane and Sutherland (2005) in their study of the spillover effects of FDI on Irish enterprises’ exports found that the presence of FDI enterprises in the manufacturing industry increases the ability and export rate of Irish enterprises. At the same time, the authors also argued that this positive effect mainly comes from American enterprises as these enterprises put greater competitive pressure, and indirectly promote the export trend of Irish enterprises.
The work of Sheng et al. (2011) also shows the impact of the FDI sector on the export of Chinese manufacturing enterprises. Using enterprise data in the period 2000-2003, the authors' regression results show that the backward linkages of FDI enterprises with domestic suppliers have a positive impact on the export value of domestic enterprises. At the same time, the presence of FDI enterprises can bring about a demonstration effect for enterprises in the same industry, thereby helping to promote the export activities of these enterprises. Not only that, the authors also point out that non-exporting FDI enterprises tend to have a higher tendency to create a positive impact on the export value of domestic enterprises through backward linkages, especially with non-state enterprises, compared to exporting FDI enterprises. Meanwhile, exporting FDI enterprises have a positive impact on the export capacity of enterprises in the same industry.
Bajgar and Javorcik (2013) have made important contributions to the analysis of the impact of FDI enterprises' linkages on the quality, quantity of products as well as the number of export markets in the context of a developing country like Romania. The results show that the presence of FDI enterprises in downstream industries (reflecting backward linkages) not only contributes to promoting the export decisions of enterprises but also increases the number of products and the number of export markets of domestic enterprises. However, FDI enterprises in the same industry (reflecting horizontal linkages) have a negative impact on these indicators.
Based on this idea of Bajgar and Javorcik (2013), Dalgıç et al. (2015) used data of manufacturing enterprises in Türkiye to analyze the impact of supply chain links between FDI enterprises and domestic enterprises on export activities. The research results showed the same conclusion as Bajgar and Javorcik (2013), the presence of FDI enterprises in downstream industries contributes to enhancing the export capacity of enterprises, while FDI enterprises in the same industry have a negative impact on
This possibility. At the same time, supply linkages between domestic suppliers and FDI enterprises also promote export orientation to high-income markets. FDI enterprises in the downstream sector also have a positive impact on the export ratio, total export value, number of items and number of export markets of domestic enterprises. However, the authors have not found evidence of the impact of backward linkages on the quality of exported goods.
While the above studies mainly consider the impact of backward linkages, the work of Takii and Narjoko (2012) aims to consider the impact of both forward linkages on the performance of Indonesian manufacturing enterprises in the period 2000-2008. Through this study, the authors argue that high-quality and cheaper inputs provided by FDI enterprises can cause domestic enterprises to reduce input imports.
Several studies in Vietnam have also examined the impact of FDI on global supply chain participation activities. At the micro level, Anwar and Nguyen (2011b) used data from the General Statistics Office to examine the impact of FDI on firms’ exports. Using a two-step Heckman regression model, the authors found statistically significant evidence of the positive impact of the presence of FDI firms on the decision to export as well as the export rate of domestic firms through horizontal and forward linkages (calculated at the industry level).
Concerned about the impact of linkages with FDI enterprises on the ability to participate in the chain of Vietnamese manufacturing SMEs in the period 2004-2008, Thangavelu (2014) used OLS and GMM regression models and showed that backward linkages with FDI enterprises help enterprises improve productivity, and from there the author concluded that linkages with FDI enterprises can help promote the ability to participate in the global supply chain of Vietnamese SMEs.
Statistics from the World Bank (2017) also showed a positive correlation between linkages with FDI enterprises and the input import rate of SMEs not only in Vietnam but also in other Asian countries such as China, Malaysia and Thailand. This can be explained by the fact that some inputs may not be produced domestically, or do not meet quality requirements, so SMEs when acting as suppliers for FDI enterprises tend to import higher levels of inputs to meet the strict standards of their partners. In other words, linkages with FDI enterprises not only affect the downstream participation of enterprises in the global supply chain (through exporting inputs) but also affect the downstream participation of enterprises in the global supply chain (through exporting inputs).
output) but also affects the upstream participation of enterprises in the chain (input import).
The results of quantitative research by OECD-UNIDO (2019) using data on enterprises in Vietnam and some other countries in the ASEAN region such as Cambodia, Indonesia, Laos, Malaysia, Myanmar, the Philippines and Thailand in the period 2004-2016 showed that the linkage between enterprises in general, and the linkage between FDI enterprises and domestic enterprises, has a positive impact on the productivity and export rate of enterprises. This conclusion also helps to affirm that supply chain linkage is an important channel to help promote the participation of domestic enterprises in the supply chain.
Thus, an overview of studies in the world and in Vietnam shows that the linkages between FDI enterprises and domestic enterprises, especially SMEs, can help promote the activities of enterprises participating in the global supply chain. However, because most studies consider the spillover effect of the FDI sector, in which the level of linkage/presence of the FDI sector is considered at the industry level (for example, Anwar and Nguyen, 2011b). According to this approach, FDI enterprises can impact domestic enterprises without necessarily having a linkage relationship (Tong et al., 2019), so the direct impacts of enterprises participating in linkages with FDI enterprises have not been pointed out . At the same time, quantitative studies on spillover effects, although helping to confirm the positive influence at the industry level from FDI enterprises to domestic enterprises, have not focused on the target group of SMEs.
In addition, some studies have only examined the correlation statistics of linkages with import activities (for example, WB, 2017), or have only provided empirical evidence on the impact of linkage types on the export activities of enterprises (for example, OECD-UNIDO, 2019), but there is no empirical evidence on the impact of linkages with FDI enterprises on the import activities of Vietnamese SMEs.
Therefore, NCS finds that there is a need for specific research on enterprise-level linkages to global supply chain activities on both the input import and output export sides.
2.3 Overview of research on factors affecting the linkage of small and medium enterprises with foreign direct investment enterprises
According to the analytical framework of Winkler (2013) and Farole and Winkler (2014), the potential of enterprises of the investment-receiving country to form links with FDI enterprises depends on
characteristics of FDI enterprises, absorptive capacity of domestic enterprises as well as factors reflecting the business environment and institutional quality of the investment-receiving country.
In this thesis, with the aim of analyzing the ability of Vietnamese SMEs to link with FDI enterprises in order to propose solutions to strengthen linkages and promote the participation of SMEs in global supply chains, the researcher aims to understand the impact of characteristics, absorptive capacity of SMEs as well as the domestic institutional environment on enterprise linkages. These groups of factors have been analyzed in studies, specifically as follows:
2.3.1 On the absorption capacity of domestic small and medium enterprises
The absorptive capacity of enterprises is understood as the ability of enterprises to take advantage of information and knowledge that enterprises can access through interactions with other enterprises (Cohen & Levinthal, 1990; Todorova & Durisin, 2007). Absorptive capacity determines the ability of SMEs to learn and meet the standards of FDI enterprises within a certain period of time. At the same time, the limited capacity of SMEs also makes FDI enterprises unwilling to associate with SMEs (OECD, 2005).
Using the case study approach, UNCTAD (2005) pointed out that in order to participate and benefit from linkages, domestic SMEs need to demonstrate their absorptive capacity in the following aspects: First, SMEs need to have a desire to succeed and a spirit of learning. Second, SMEs need to meet performance standards and continuously improve these standards. Third, SMEs need to identify their strengths and weaknesses and develop strategies to take advantage of their competitive advantages. Fourth, SMEs need to identify suitable FDI partners to link with. Fifth, SMEs need to be careful in negotiating contracts so that these linkages benefit the enterprise in the long term. Sixth, SMEs also need to have the ability and willingness to innovate themselves to satisfy the needs of partners. Seventh, SMEs also need to affirm their value to partners, such as understanding the political system, laws, and domestic market as well as other benefits, so that FDI partners can perceive the benefits of associating with FDI enterprises, thereby enhancing the ability to form these links.
Using quantitative analysis, Farole and Winkler (2014) showed that Vietnamese enterprises are more likely to participate in linkages with FDI enterprises than
with enterprises in the Sub-Saharan region of Africa thanks to better absorption capacity, thereby affirming that the absorption capacity of domestic enterprises is an important factor determining the ability to participate in linkages with FDI enterprises.
The absorptive capacity of enterprises in the host country is a function of the characteristics of the enterprise and the technological gap with FDI enterprises (OECD-UNIDO, 2019). Accordingly, one of the factors determining the absorptive capacity of domestic enterprises is the size of the enterprise (Knell & Rojec, 2007). Large-scale enterprises are also able to pay higher wages, so they can easily hire workers who have worked for FDI enterprises, thereby easily competing and imitating FDI enterprises (Crespo & Fontoura 2007). Quantitative research by Tusha et al. (2017) on linkages between FDI enterprises and domestic enterprises in Vietnam also confirms this when it shows that the larger the enterprise, the higher the absorptive capacity, thereby having a positive impact on the ability of domestic enterprises to participate in linkages.
The form of ownership of enterprises is also confirmed to affect the absorptive capacity and linkage ability of enterprises in many studies. State-owned enterprises are considered to receive many incentives from the Government in accessing resources, but therefore may be less effective when linking with FDI enterprises (Nguyen Nam Anh, 2019).
Not only that, the quality and qualifications of workers also have a direct impact on the absorptive capacity of enterprises (Meyer & Sinani, 2005; Blalock & Gertler, 2009). According to Blalock and Gertler (2009), the proportion of workers with college and university degrees increases the absorptive capacity of manufacturing enterprises in Indonesia, thereby increasing the ability to link and benefits for enterprises with FDI enterprises. Analysis by WB (2017) also shows that the labor qualifications of affiliated SMEs are also higher than those of the unaffiliated group. At the same time, affiliated SMEs also face less difficulty in recruiting workers with skills in engineering, information technology, foreign languages, management, etc. compared to unaffiliated enterprises. Quantitative analysis in this WB report also shows that the labor training courses that enterprises conduct have a positive impact on the ability of SMEs to become suppliers of FDI enterprises.
Research has also shown that in order to promote the formation and development of FDI linkages, there needs to be dynamic development of SMEs, in which technology level and innovation capacity play a decisive role.
Enterprises with product research and development capacity are considered by the WB (2017) to have innovation capacity to meet the requirements of foreign customers and FDI enterprises in terms of product diversity, quality and price. The quantitative research results of the WB have shown that innovation in production and business processes has a positive impact on the ability of domestic SMEs to become suppliers for FDI enterprises. Enterprises with high technology level are also confirmed to have a higher ability to participate in knowledge-intensive linkages with FDI enterprises (Saliola & Zanfei, 2009). A case study of automobile enterprises in South Africa also shows that the technological level of domestic suppliers is one of the important factors determining the backward linkages of FDI enterprises with domestic enterprises.
Many business surveys have shown that finance is the most important factor determining the survival and growth of small and medium enterprises in both developed and developing countries (Ruffing, 2006). It is a fact that, although SMEs play an important role in the economy, they often face many obstacles in accessing formal sources of credit and capital. Commercial banks and investors are often reluctant to provide capital and invest in SMEs for various reasons. First, from the perspective of credit institutions and investors, SMEs are high risk due to limited assets, low capital mobilization capacity, and vulnerability to market fluctuations as well as high failure rates. Second, SMEs often lack accounting records, financial statements or business plans, which makes it difficult for credit institutions and investors to assess the creditworthiness of SME proposals. Third, the administrative and transaction costs of borrowing are relatively high while the loans are relatively small, making the profitability of these loans for credit institutions insignificant (UNCTAD, 2002).
In practice, before signing contracts with domestic enterprises, FDI enterprises often require partners to make investments, improve processes and products (Javorcik & Spatareanu, 2009). Therefore, it is the difficulties in accessing finance that prevent SMEs from carrying out these activities, thereby reducing the opportunities for SMEs to link up with other enterprises, especially FDI enterprises (Canare et al., 2017). Quantitative research by Javorcik and Spatareanu (2009) also confirmed that the better the liquidity of an enterprise, the easier it is for the enterprise to become a supplier for FDI enterprises. However, according to statistics from the WB (2017), although Vietnamese SMEs surveyed

![Qos Assurance Methods for Multimedia Communications
zt2i3t4l5ee
zt2a3gs
zt2a3ge
zc2o3n4t5e6n7ts
low. The EF PHB requires a sufficiently large number of output ports to provide low delay, low loss, and low jitter.
EF PHBs can be implemented if the output ports bandwidth is sufficiently large, combined with small buffer sizes and other network resources dedicated to EF packets, to allow the routers service rate for EF packets on an output port to exceed the arrival rate λ of packets at that port.
This means that packets with PHB EF are considered with a pre-allocated amount of output bandwidth and a priority that ensures minimum loss, minimum delay and minimum jitter before being put into operation.
PHB EF is suitable for channel simulation, leased line simulation, and real-time services such as voice, video without compromising on high loss, delay and jitter values.
Figure 2.10 Example of EF installation
Figure 2.10 shows an example of an EF PHB implementation. This is a simple priority queue scheduling technique. At the edges of the DS domain, EF packet traffic is prioritized according to the values agreed upon by the SLA. The EF queue in the figure needs to output packets at a rate higher than the packet arrival rate λ. To provide an EF PHB over an end-to-end DS domain, bandwidth at the output ports of the core routers needs to be allocated in advance to ensure the requirement μ > λ. This can be done by a pre-configured provisioning process. In the figure, EF packets are placed in the priority queue (the upper queue). With such a length, the queue can operate with μ > λ.
Since EF was primarily used for real-time services such as voice and video, and since real-time services use UDP instead of TCP, RED is generally
not suitable for EF queues because applications using UDP will not respond to random packet drop and RED will strip unnecessary packets.
2.2.4.2 Assured Forwarding (AF) PHB
PHB AF is defined by RFC 2597. The purpose of PHB AF is to deliver packets reliably and therefore delay and jitter are considered less important than packet loss. PHB AF is suitable for non-real-time services such as applications using TCP. PHB AF first defines four classes: AF1, AF2, AF3, AF4. For each of these AF classes, packets are then classified into three subclasses with three distinct priority levels.
Table 2.8 shows the four AF classes and 12 AF subclasses and the DSCP values for the 12 AF subclasses defined by RFC 2597. RFC 2597 also allows for more than three separate priority levels to be added for internal use. However, these separate priority levels will only have internal significance.
PHB Class
PHB Subclass
Package type
DSCP
AF4
AF41
Short
100010
AF42
Medium
100100
AF43
High
100110
AF3
AF31
Short
011010
AF32
Medium
011100
AF33
High
011110
AF2
AF21
Short
010010
AF22
Medium
010100
AF23
High
010110
AF1
AF11
Short
001010
AF12
Medium
001100
AF13
High
001110
Table 2.8 AF DSCPs
The AF PHB ensures that packets are forwarded with a high probability of delivery to the destination within the bounds of the rate agreed upon in an SLA. If AF traffic at an ingress port exceeds the pre-priority rate, which is considered non-compliant or “out of profile”, the excess packets will not be delivered to the destination with the same probability as the packets belonging to the defined traffic or “in profile” packets. When there is network congestion, the out of profile packets are dropped before the in profile packets are dropped.
When service levels are defined using AF classes, different quantity and quality between AF classes can be realized by allocating different amounts of bandwidth and buffer space to the four AF classes. Unlike
EF, most AF traffic is non-real-time traffic using TCP, and the RED queue management strategy is an AQM (Adaptive Queue Management) strategy suitable for use in AF PHBs. The four AF PHB layers can be implemented as four separate queues. The output port bandwidth is divided into four AF queues. For each AF queue, packets are marked with three “colors” corresponding to three separate priority levels.
In addition to the 32 DSCP 1 groups defined in Table 2.8, 21 DSCPs have been standardized as follows: one for PHB EF, 12 for PHB AF, and 8 for CSCP. There are 11 DSCP 1 groups still available for other standards.
2.2.5.Example of Differentiated Services
We will look at an example of the Differentiated Service model and mechanism of operation. The architecture of Differentiated Service consists of two basic sets of functions:
Edge functions: include packet classification and traffic conditioning. At the inbound edge of the network, incoming packets are marked. In particular, the DS field in the packet header is set to a certain value. For example, in Figure 2.12, packets sent from H1 to H3 are marked at R1, while packets from H2 to H4 are marked at R2. The labels on the received packets identify the service class to which they belong. Different traffic classes receive different services in the core network. The RFC definition uses the term behavior aggregate rather than the term traffic class. After being marked, a packet can be forwarded immediately into the network, delayed for a period of time before being forwarded, or dropped. We will see that there are many factors that affect how a packet is marked, and whether it is forwarded immediately, delayed, or dropped.
Figure 2.12 DiffServ Example
Core functionality: When a DS-marked packet arrives at a Diffservcapable router, the packet is forwarded to the next router based on
Per-hop behavior is associated with packet classes. Per-hop behavior affects router buffers and the bandwidth shared between competing classes. An important principle of the Differentiated Service architecture is that a routers per-hop behavior is based only on the packets marking or the class to which it belongs. Therefore, if packets sent from H1 to H3 as shown in the figure receive the same marking as packets from H2 to H4, then the network routers treat the packets exactly the same, regardless of whether the packet originated from H1 or H2. For example, R3 does not distinguish between packets from h1 and H2 when forwarding packets to R4. Therefore, the Differentiated Service architecture avoids the need to maintain router state about separate source-destination pairs, which is important for network scalability.
Chapter Conclusion
Chapter 2 has presented and clarified two main models of deploying and installing quality of service in IP networks. While the traditional best-effort model has many disadvantages, later models such as IntServ and DiffServ have partly solved the problems that best-effort could not solve. IntServ follows the direction of ensuring quality of service for each separate flow, it is built similar to the circuit switching model with the use of the RSVP resource reservation protocol. IntSer is suitable for services that require fixed bandwidth that is not shared such as VoIP services, multicast TV services. However, IntSer has disadvantages such as using a lot of network resources, low scalability and lack of flexibility. DiffServ was born with the idea of solving the disadvantages of the IntServ model.
DiffServ follows the direction of ensuring quality based on the principle of hop-by-hop behavior based on the priority of marked packets. The policy for different types of traffic is decided by the administrator and can be changed according to reality, so it is very flexible. DiffServ makes better use of network resources, avoiding idle bandwidth and processing capacity on routers. In addition, the DifServ model can be deployed on many independent domains, so the ability to expand the network becomes easy.
Chapter 3: METHODS TO ENSURE QoS FOR MULTIMEDIA COMMUNICATIONS
In packet-switched networks, different packet flows often have to share the transmission medium all the way to the destination station. To ensure the fair and efficient allocation of bandwidth to flows, appropriate serving mechanisms are required at network nodes, especially at gateways or routers, where many different data flows often pass through. The scheduler is responsible for serving packets of the selected flow and deciding which packet will be served next. Here, a flow is understood as a set of packets belonging to the same priority class, or originating from the same source, or having the same source and destination addresses, etc.
In normal state when there is no congestion, packets will be sent as soon as they are delivered. In case of congestion, if QoS assurance methods are not applied, prolonged congestion can cause packet drops, affecting service quality. In some cases, congestion is prolonged and widespread in the network, which can easily lead to the network being frozen, or many packets being dropped, seriously affecting service quality.
Therefore, in this chapter, in sections 3.2 and 3.3, we introduce some typical network traffic load monitoring techniques to predict and prevent congestion before it occurs through the measure of dropping (removing) packets early when there are signs of impending congestion.
3.1. DropTail method
DropTail is a simple, traditional queue management method based on FIFO mechanism. All incoming packets are placed in the queue, when the queue is full, the later packets are dropped.
Due to its simplicity and ease of implementation, DropTail has been used for many years on Internet router systems. However, this algorithm has the following disadvantages:
− Cannot avoid the phenomenon of “Lock out”: Occurs when 1 or several traffic streams monopolize the queue, making packets of other connections unable to pass through the router. This phenomenon greatly affects reliable transmission protocols such as TCP. According to the anti-congestion algorithm, when locked out, the TCP connection stream will reduce the window size and reduce the packet transmission speed exponentially.
− Can cause Global Synchronization: This is the result of a severe “Lock out” phenomenon. Some neighboring routers have their queues monopolized by a number of connections, causing a series of other TCP connections to be unable to pass through and simultaneously reducing the transmission speed. After those monopolized connections are temporarily suspended,
Once the queue is cleared, it takes a considerable amount of time for TCP connections to return to their original speed.
− Full Queue phenomenon: Data transmitted on the Internet often has an explosion, packets arriving at the router are often in clusters rather than in turn. Therefore, the operating mechanism of DropTail makes the queue easily full for a long period of time, leading to the average delay time of large packets. To avoid this phenomenon, with DropTail, the only way is to increase the routers buffer, this method is very expensive and ineffective.
− No QoS guarantee: With the DropTail mechanism, there is no way to prioritize important packets to be transmitted through the router earlier when all are in the queue. Meanwhile, with multimedia communication, ensuring connection and stable speed is extremely important and the DropTail algorithm cannot satisfy.
The problem of choosing the buffer size of the routers in the network is to “absorb” short bursts of traffic without causing too much queuing delay. This is necessary in bursty data transmission. The queue size determines the size of the packet bursts (traffic spikes) that we want to be able to transmit without being dropped at the routers.
In IP-based application networks, packet dropping is an important mechanism for indirectly reporting congestion to end stations. A solution that prevents router queues from filling up while reducing the packet drop rate is called dynamic queue management.
3.2. Random elimination method – RED
3.2.1 Overview
RED (Random Early Detection of congestion; Random Early Drop) is one of the first AQM algorithms proposed in 1993 by Sally Floyd and Van Jacobson, two scientists at the Lawrence Berkeley Laboratory of the University of California, USA. Due to its outstanding advantages compared to previous queue management algorithms, RED has been widely installed and deployed on the Internet.
The most fundamental point of their work is that the most effective place to detect congestion and react to it is at the gateway or router.
Source entities (senders) can also do this by estimating end-to-end delay, throughput variability, or the rate of packet retransmissions due to drop. However, the sender and receiver view of a particular connection cannot tell which gateways on the network are congested, and cannot distinguish between propagation delay and queuing delay. Only the gateway has a true view of the state of the queue, the link share of the connections passing through it at any given time, and the quality of service requirements of the
traffic flows. The RED gateway monitors the average queue length, which detects early signs of impending congestion (average queue length exceeding a predetermined threshold) and reacts appropriately in one of two ways:
− Drop incoming packets with a certain probability, to indirectly inform the source of congestion, the source needs to reduce the transmission rate to keep the queue from filling up, maintaining the ability to absorb incoming traffic spikes.
− Mark “congestion” with a certain probability in the ECN field in the header of TCP packets to notify the source (the receiving entity will copy this bit into the acknowledgement packet).
Figure 3. 1 RED algorithm
The main goal of RED is to avoid congestion by keeping the average queue size within a sufficiently small and stable region, which also means keeping the queuing delay sufficiently small and stable. Achieving this goal also helps: avoid global synchronization, not resist bursty traffic flows (i.e. flows with low average throughput but high volatility), and maintain an upper bound on the average queue size even in the absence of cooperation from transport layer protocols.
To achieve the above goals, RED gateways must do the following:
− The first is to detect congestion early and react appropriately to keep the average queue size small enough to keep the network operating in the low latency, high throughput region, while still allowing the queue size to fluctuate within a certain range to absorb short-term fluctuations. As discussed above, the gateway is the most appropriate place to detect congestion and is also the most appropriate place to decide which specific connection to report congestion to.
− The second thing is to notify the source of congestion. This is done by marking and notifying the source to reduce traffic. Normally the RED gateway will randomly drop packets. However, if congestion
If congestion is detected before the queue is full, it should be combined with packet marking to signal congestion. The RED gateway has two options: drop or mark; where marking is done by marking the ECN field of the packet with a certain probability, to signal the source to reduce the traffic entering the network.
− An important goal that RED gateways need to achieve is to avoid global synchronization and not to resist traffic flows that have a sudden characteristic. Global synchronization occurs when all connections simultaneously reduce their transmission window size, leading to a severe drop in throughput at the same time. On the other hand, Drop Tail or Random Drop strategies are very sensitive to sudden flows; that is, the gateway queue will often overflow when packets from these flows arrive. To avoid these two phenomena, gateways can use special algorithms to detect congestion and decide which connections will be notified of congestion at the gateway. The RED gateway randomly selects incoming packets to mark; with this method, the probability of marking a packet from a particular connection is proportional to the connections shared bandwidth at the gateway.
− Another goal is to control the average queue size even without cooperation from the source entities. This can be done by dropping packets when the average size exceeds an upper threshold (instead of marking it). This approach is necessary in cases where most connections have transmission times that are less than the round-trip time, or where the source entities are not able to reduce traffic in response to marking or dropping packets (such as UDP flows).
3.2.2 Algorithm
This section describes the algorithm for RED gateways. RED gateways calculate the average queue size using a low-pass filter. This average queue size is compared with two thresholds: minth and maxth. When the average queue size is less than the lower threshold, no incoming packets are marked or dropped; when the average queue size is greater than the upper threshold, all incoming packets are dropped. When the average queue size is between minth and maxth, each incoming packet is marked or dropped with a probability pa, where pa is a function of the average queue size avg; the probability of marking or dropping a packet for a particular connection is proportional to the bandwidth share of that connection at the gateway. The general algorithm for a RED gateway is described as follows: [5]
For each packet arrival
Caculate the average queue size avg If minth ≤ avg < maxth
div.maincontent .s1 { color: black; font-family:Times New Roman, serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 15pt; }
div.maincontent .s2 { color: black; font-family:Times New Roman, serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 15pt; }
div.maincontent .p { color: black; font-family:Times New Roman, serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; margin:0pt; }
div.maincontent p { color: black; font-family:Times New Roman, serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; margin:0pt; }
div.maincontent .s3 { color: black; font-family:Times New Roman, serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 14pt; }
div.maincontent .s4 { color: black; font-family:Times New Roman, serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; }
div.maincontent .s5 { color: black; font-family:Times New Roman, serif; font-style: italic; font-weight: normal; text-decoration: none; font-size: 14pt; }
div.maincontent .s6 { color: black; font-family:Times New Roman, serif; font-style: italic; font-weight: bold; text-decoration: none; font-size: 14pt; }
div.maincontent .s7 { color: black; font-family:Wingdings; font-style: normal; font-weight: normal; text-decoration: none; font-size: 14pt; }
div.maincontent .s8 { color: black; font-family:Arial, sans-serif; font-style: italic; font-weight: bold; text-decoration: none; font-size: 15pt; }
div.maincontent .s9 { color: black; font-family:Times New Roman, serif; font-style: normal; font-weight: bold; text-decoration: none; font-size: 14pt; }
div.maincontent .s10 { color: black; font-family:Times New Roman, serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 9pt; vertical-align: 6pt; }
div.maincontent .s11 { color: black; font-family:Times New Roman, serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 13pt; }
div.maincontent .s12 { color: black; font-family:Times New Roman, serif; font-style: normal; font-weight: normal; text-decoration: none; font-size: 10pt; }
div.maincontent .s13 { color: black; font-family:Times New Roman, serif; font-style: normal; font-weight: normal; text-d](https://tailieuthamkhao.com/uploads/2022/05/15/danh-gia-hieu-qua-dam-bao-qos-cho-truyen-thong-da-phuong-tien-cua-chien-6-1-120x90.jpg)



