Equivalent capacity and its application to bandwidth allocation in high-speed networks
Reads0
Chats0
TLDR
The authors propose a computationally simple approximate expression to provide a unified metric to represent the effective bandwidth used by connections and the corresponding effective load of network links, which can then be used for efficient bandwidth management, routing, and call control procedures aimed at optimizing network usage.Abstract:
The authors propose a computationally simple approximate expression for the equivalent capacity or bandwidth requirement of both individual and multiplexed connections, based on their statistical characteristics and the desired grade-of-service (GOS). The purpose of such an expression is to provide a unified metric to represent the effective bandwidth used by connections and the corresponding effective load of network links. These link metrics can then be used for efficient bandwidth management, routing, and call control procedures aimed at optimizing network usage. While the methodology proposed can provide an exact approach to the computation of the equivalent capacity, the associated complexity makes it infeasible for real-time network traffic control applications. Hence, an approximation is required. The validity of the approximation developed is verified by comparison to both exact computations and simulation results. >read more
'83@/<=3>C90#/88=C6@+83+'83@/<=3>C90#/88=C6@+83+
%-296+<6C97798=%-296+<6C97798=
/:+<>7/8>+6#+:/<=% /:+<>7/8>906/-><3-+6%C=>/7=8138//<381
;?3@+6/8>+:+-3>C+8.>=::63-+>398>9+8.A3.>2669-+>39838;?3@+6/8>+:+-3>C+8.>=::63-+>398>9+8.A3.>2669-+>39838
312%://.!/>A9<5=312%://.!/>A9<5=
$9-2?H<38
'83@/<=3>C90#/88=C6@+83+
1?/<38+-79<1
+73.27+.3
$/=/+<-23@3=398
+279?.!+12=238/2
$/=/+<-23@3=398
9669A>23=+8.+..3>398+6A9<5=+>2>>:=</:9=3>9<C?:/88/.?/=/*:+:/<=
#+<>90>2/313>+6977?83-+>398=+8.!/>A9<538197798=
$/-977/8./.3>+>398$/-977/8./.3>+>398
$9-2?H<38+73.27+.3+8. +279?.!+12=238/2;?3@+6/8>+:+-3>C+8.>=::63-+>398>9
+8.A3.>2669-+>39838312%://.!/>A9<5=%/:>/7,/<
9:C<312>$/:<38>/.0<97
9?<8+698%/6/->/.</+=38977?83-+>398=
(96?7/==?/
%/:>/7,/<:+1/=
&23=7+>/<3+63=:9=>/.2/</A3>2:/<73==39890>2/%?-2:/<73==39890>2/.9/=89>38+8CA+C37:6C
/8.9<=/7/8>90+8C90>2/'83@/<=3>C90#/88=C6@+83+=:<9.?->=9<=/<@3-/=8>/<8+69<:/<=98+6?=/90>23=
7+>/<3+63=:/<73>>/.9A/@/<:/<73==398>9</:<38></:?,63=2>23=7+>/<3+609<+.@/<>3=3819<:<979>398+6
:?<:9=/=9<09<-</+>3818/A-966/->3@/A9<5=09<</=+6/9<</.3=><3,?>3987?=>,/9,>+38/.0<97>2/,CA<3>381
>9:?,=:/<73==398=3///9<1C-299=381>9@3/A>23=.9-?7/8>C9?+1<//>9+66:<9@3=398=90>2/-9:C<312>6+A=
:<9>/->3813>
!"&>>2/>37/90:?,63-+>398+?>29<$9-2?/<38A+=+G63+>/.A3>2>2/ $/=/+<-23@3=398?<</8>6C?6C
2/3=+0+-?6>C7/7,/<38>2//:+<>7/8>906/-><3-+6+8.%C=>/7=8138//<381+>>2/'83@/<=3>C90
#/88=C6@+83+
&23=:+:/<3=:9=>/.+>%-296+<6C97798=2>>:=</:9=3>9<C?:/88/.?/=/*:+:/<=
9<79</3809<7+>398:6/+=/-98>+-></:9=3>9<C:9,9B?:/88/.?
;?3@+6/8>+:+-3>C+8.>=::63-+>398>9+8.A3.>2669-+>39838312%://.;?3@+6/8>+:+-3>C+8.>=::63-+>398>9+8.A3.>2669-+>39838312%://.
!/>A9<5=!/>A9<5=
,=><+->,=><+->
312=://.0+=>:+-5/>=A3>-2/.8/>A9<5+<-23>/->?</=+</-+:+,6/90=?::9<>381+A3./<+81/90
-988/->398=A3>2.300/</8>,+8.A3.>2</;?3</7/8>=+8.><+G--2+<+->/<3=>3-=)236/>23=/8@3<987/8>
:<9@3./=38-</+=/.F/B3,363>C38=?::9<>381@+<39?==/<@3-/=3>=.C8+73-8+>?</:9=/=.3G-?6>><+G-
-98><96:<9,6/7=A2/8><C381>9+-23/@//G-3/8>?=/908/>A9<5</=9?<-/="8/=?-2+:<9,6/73=>2/
3==?/90,+8.A3.>27+8+1/7/8>+8.+669-+>398/-+?=/90>2/=>+>3=>3-+67?6>3:6/B38190+66-988/->398=
+>>2/:2C=3-+66+C/<+8.>2/@+<3+>398=90-988/->398=,3><+>/3>3=37:9<>+8>>9-2+<+->/<3D/09<+13@/8
<+./"0%/<@3-/"%,9>2>2//00/->3@/,+8.A3.>2</;?3</7/8>90+=3816/-988/->398+8.>2/
+11</1+>/,+8.A3.>2?=+1/907?6>3:6/B/.-988/->398=8>23=:+:/<A/:<9:9=/+-97:?>+>398+66C
=37:6/+::<9B37+>//B:</==39809<>2/
/;?3@+6/8>-+:+-3>C
9<,+8.A3.>2</;?3</7/8>90,9>238.3@3.?+6
+8.7?6>3:6/B/.-988/->398=,+=/.98>2/3<=>+>3=>3-+6-2+<+->/<3=>3-=+8.>2/./=3</."%&2/:?<:9=/
90=?-2+8/B:</==3983=>9:<9@3./+?83E/.7/><3->9</:</=/8>>2//00/->3@/,+8.A3.>2?=/.,C
-988/->398=+8.>2/-9<</=:98.381/00/->3@/69+.908/>A9<56385=&2/=/63857/><3-=-+8>2/8,/?=/.
09</G-3/8>,+8.A3.>27+8+1/7/8><9?>381+8.-+66-98><96:<9-/.?</=+37/.+>9:>373D3818/>A9<5
?=+1/)236/>2/7/>29.9691C:<9:9=/.38>2/:+:/<-+8:<9@3./+8/B+->+::<9+-2>9>2/-97:?>+>398
90>2//;?3@+6/8>-+:+-3>C>2/+==9-3+>/.-97:6/B3>C7+5/=3>380/+=3,6/09<</+6>37/8/>A9<5><+G-
-98><96+::63-+>398=2/8-/+8+::<9B37+>3983=</;?3</.&2/@+63.3>C90>2/+::<9B37+>398./@/69:/.38
>2/:+:/<3=@/<3E/.,C-97:+<3=98>9,9>2/B+->-97:?>+>398=+8.=37?6+>398</=?6>=
/CA9<.=/CA9<.=
;?3@+6/8>+8.A3.>2+66+.73==3988/>A9<5
3=-3:638/=3=-3:638/=
313>+6977?83-+>398=+8.!/>A9<5381
977/8>=977/8>=
9:C<312>$/:<38>/.0<97
9?<8+698%/6/->/.</+=38977?83-+>398=
(96?7/==?/
%/:>/7,/<:+1/=
&23=7+>/<3+63=:9=>/.2/</A3>2:/<73==39890>2/%?-2:/<73==39890>2/.9/=89>38+8CA+C
37:6C/8.9<=/7/8>90+8C90>2/'83@/<=3>C90#/88=C6@+83+=:<9.?->=9<=/<@3-/=8>/<8+69<
:/<=98+6?=/90>23=7+>/<3+63=:/<73>>/.9A/@/<:/<73==398>9</:<38></:?,63=2>23=7+>/<3+609<
+.@/<>3=3819<:<979>398+6:?<:9=/=9<09<-</+>3818/A-966/->3@/A9<5=09<</=+6/9<</.3=><3,?>3987?=>
,/9,>+38/.0<97>2/,CA<3>381>9:?,=:/<73==398=3///9<1C-299=381>9@3/A>23=.9-?7/8>
C9?+1<//>9+66:<9@3=398=90>2/-9:C<312>6+A=:<9>/->3813>
!"&>>2/>37/90:?,63-+>398+?>29<$9-2?/<38A+=+G63+>/.A3>2>2/ $/=/+<-23@3=398
?<</8>6C?6C2/3=+0+-?6>C7/7,/<38>2//:+<>7/8>906/-><3-+6+8.%C=>/7=8138//<381+>
>2/'83@/<=3>C90#/88=C6@+83+
&23=49?<8+6+<>3-6/3=+@+36+,6/+>%-296+<6C97798=2>>:=</:9=3>9<C?:/88/.?/=/*:+:/<=
Citations
More filters
Journal ArticleDOI
Long-range dependence in variable-bit-rate video traffic
TL;DR: It is shown that the long-range dependence property allows us to clearly distinguish between measured data and traffic generated by VBR source models currently used in the literature, and gives rise to novel and challenging problems in traffic engineering for high-speed networks.
Journal ArticleDOI
Fundamental design issues for the future Internet
TL;DR: This work addresses some of the fundamental architectural design issues facing the future Internet, including whether the Internet should adopt a new service model, how this service model should be invoked, and whether this service models should include admission control.
Proceedings ArticleDOI
Supporting real-time applications in an Integrated Services Packet Network: architecture and mechanism
TL;DR: This paper considers the support of real-time applications in an Integrated Services Packet Network (ISPN), and proposes an ISPN architecture that supports two distinct kinds of real time service: guaranteed service, which involves pre-computed worst-case delay bounds, and predicted service which uses the measure performance of the network in computing delay bounds.
Journal ArticleDOI
Stability, queue length, and delay of deterministic and stochastic queueing networks
TL;DR: The notion of MER with respect to /spl theta/ is shown to be equivalent to the recently developed notion of effective bandwidth in communication networks.
Journal ArticleDOI
Experimental queueing analysis with long-range dependent packet traffic
TL;DR: It is demonstrated empirically that, beyond its statistical significance in traffic measurements, long-range dependence has considerable impact on queueing performance, and is a dominant characteristic for a number of packet traffic engineering problems.
References
More filters
Journal ArticleDOI
Stochastic theory of a data-handling system with multiple sources
TL;DR: In this article, the authors considered a physical model in which a buffer receives messages from a finite number of statistically independent and identical information sources that asynchronously alternate between exponentially distributed periods in the ‘on’ and ‘off' states.
Journal ArticleDOI
Performance models of statistical multiplexing in packet video communications
TL;DR: This demonstrates that statistical or asynchronous time-division multiplexing (TDM) can efficiently absorb temporal variations of the bit rate of individual sources without the significant variations in reception quality exhibited by multimode videocoders for synchronous TDM or circuit-switched transmission.
Journal ArticleDOI
Approximating a Point Process by a Renewal Process, I: Two Basic Methods
TL;DR: The purpose here is to provide a better understanding of these procedures and a general framework for making new approximations, in particular, the two basic procedures can be used as building blocks to construct refined composite procedures.
Journal ArticleDOI
Stochastic theory of a fluid model of producers and consumers coupled by a buffer
TL;DR: In this article, the authors derived efficient computational procedures and numerically investigated the following fluid model which is of interest in manufacturing and communications: m producing machines supply a buffer, n consuming machines feed off it, each machine independently alternates between exponentially distributed random periods in the ‘in service' and 'failed' states.
Journal ArticleDOI
Multimedia traffic management principles for guaranteed ATM network performance
G.M. Woodruff,R. Kositpaiboon +1 more
TL;DR: A framework is presented for the specification of performance requirements, and several high-level design principles for performance-driven ATM traffic controls based on resource reservation are developed, and results illustrate that to guarantee performance levels, bursty traffic should be statistically multiplexed only if connection peak rates are low relative to the network link speed or burst durations are short.
Related Papers (5)
Effective bandwidth of general Markovian traffic sources and admission control of high speed networks
Anwar Elwalid,Debasis Mitra +1 more
Stochastic theory of a data-handling system with multiple sources
A generalized processor sharing approach to flow control in integrated services networks: the multiple node case
Abhay Parekh,Robert G. Gallager +1 more