4 research outputs found

    BPTraSha: A Novel Algorithm for Shaping Bursty Nature of Internet Traffic

    Get PDF
    Various researchers have reported that traffic measurements demonstrate considerable burstiness on several time scales, with properties of self-similarity. Also, the rapid development of technologies has widened the scope of network and Internet applications and, in turn, increased traffic. The self-similar nature of this data traffic may exhibit spikiness and burstiness on large scales with such behaviour being caused by strong dependence characteristics in data: that is, large values tend to come in clusters and clusters of clusters and so on. Several studies have shown that TCP, the dominant network (Internet) transport protocol, contributes to the propagation of self-similarity. Bursty traffic can affect the Quality of Service of all traffic on the network by introducing inconsistent latency. It is easier to manage the workloads under less bursty (i.e. smoother) conditions. In this paper, we introduce a novel algorithm for traffic shaping, which can smooth out the traffic burstiness. We name it the Bursty Packet Traffic Shaper (BPTraSha). Experimental results show that this approach allows significant traffic control by smoothing the incoming traffic. BPTraSha can be implemented on the distribution router buffer so that the traffic's bursty nature can be modified before it is transmitted over the core network (Internet)

    Resource dimensioning in a mixed traffic environment

    Get PDF
    An important goal of modern data networks is to support multiple applications over a single network infrastructure. The combination of data, voice, video and conference traffic, each requiring a unique Quality of Service (QoS), makes resource dimensioning a very challenging task. To guarantee QoS by mere over-provisioning of bandwidth is not viable in the long run, as network resources are expensive. The aim of proper resource dimensioning is to provide the required QoS while making optimal use of the allocated bandwidth. Dimensioning parameters used by service providers today are based on best practice recommendations, and are not necessarily optimal. This dissertation focuses on resource dimensioning for the DiffServ network architecture. Four predefined traffic classes, i.e. Real Time (RT), Interactive Business (IB), Bulk Business (BB) and General Data (GD), needed to be dimensioned in terms of bandwidth allocation and traffic regulation. To perform this task, a study was made of the DiffServ mechanism and the QoS requirements of each class. Traffic generators were required for each class to perform simulations. Our investigations show that the dominating Transport Layer protocol for the RT class is UDP, while TCP is mostly used by the other classes. This led to a separate analysis and requirement for traffic models for UDP and TCP traffic. Analysis of real-world data shows that modern network traffic is characterized by long-range dependency, self-similarity and a very bursty nature. Our evaluation of various traffic models indicates that the Multi-fractal Wavelet Model (MWM) is best for TCP due to its ability to capture long-range dependency and self-similarity. The Markov Modulated Poisson Process (MMPP) is able to model occasional long OFF-periods and burstiness present in UDP traffic. Hence, these two models were used in simulations. A test bed was implemented to evaluate performance of the four traffic classes defined in DiffServ. Traffic was sent through the test bed, while delay and loss was measured. For single class simulations, dimensioning values were obtained while conforming to the QoS specifications. Multi-class simulations investigated the effects of statistical multiplexing on the obtained values. Simulation results for various numerical provisioning factors (PF) were obtained. These factors are used to determine the link data rate as a function of the required average bandwidth and QoS. The use of class-based differentiation for QoS showed that strict delay and loss bounds can be guaranteed, even in the presence of very high (up to 90%) bandwidth utilization. Simulation results showed small deviations from best practice recommendation PF values: A value of 4 is currently used for both RT and IB classes, while 2 is used for the BB class. This dissertation indicates that 3.89 for RT, 3.81 for IB and 2.48 for BB achieve the prescribed QoS more accurately. It was concluded that either the bandwidth distribution among classes, or quality guarantees for the BB class should be adjusted since the RT and IB classes over-performed while BB under-performed. The results contribute to the process of resource dimensioning by adding value to dimensioning parameters through simulation rather than mere intuition or educated guessing.Dissertation (MEng (Electronic Engineering))--University of Pretoria, 2007.Electrical, Electronic and Computer Engineeringunrestricte

    A packet scheduling algorithm using traffic policing in LTE downlink networks

    Get PDF
    Orientador: Lee Luan LingDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de ComputaçãoResumo: Neste trabalho, melhoramos o desempenho dos tradicionais algoritmos de escalonamento de pacotes na rede LTE (Long-Term Evolution) para aplicações de serviços multimídia, usando mecanismos de policiamento de tráfego conhecidas como reguladores de balde furado (do inglês, Leaky bucket). Busca-se atingir a equidade entre classes de serviços, controlando as taxas de chegada de pacotes nas filas de transmissão do escalonador. O cenário de simulação considera múltiplos usuários movimentando-se aleatoriamente a duas velocidades diferentes envolvendo os fluxos de tráfego de vídeo e VoIP. A avaliação de desempenho foi realizada em termos de parâmetros de qualidade de serviço, como atraso de pacotes, taxa de perda de pacotes e vazão média para tráfego de vídeo e VoIP. Os resultados da simulação confirmam que os escalonadores com tráfego de entrada policiado fornecem melhor desempenho para serviços em tempo real, especialmente aqueles que envolvem tráfego de vídeoAbstract: In this work, we improve the performance of traditional packet-scheduling algorithms in Long-Term Evolution (LTE) for multimedia service applications, using traffic policing mechanisms known as leaky bucket regulation. It seeks to achieve fairness between classes of services, controlling the arrival rates of packets in the transmission queues of the scheduler. The simulation scenario considers multiple users randomly moving at two different speeds using video and VoIP traffic flows. The performance evaluation was performed in terms of quality of service parameters, such as packet delay, packet loss rate and average throughput for video and VoIP traffic. Simulation results confirm that schedulers with polled input traffic provide better performance for realtime services, especially those involving video trafficMestradoTelecomunicações e TelemáticaMestra em Engenharia Elétric

    Characterization of Long-Range Dependent Traffic Regulated by Leaky-Bucket Policers and Shapers

    No full text
    Long-range dependence (LRD) is a widely verified property of Internet traffic, which severely affects network queuing performance. An approach for guaranteeing quality-of-service requirements is enforcing the statistical profile of input traffic by policing or shaping regulators. In this paper, it is investigated by thorough simulation how leaky-bucket (LB) policers and shapers affect the LRD of regulated traffic having 1=f a power spectral density. Unlike previous studies on this subject, spectral analysis of regulated traffic and estimation of its LRD parameter a are carried out in the time domain using the Modified Allan Variance, because of its demonstrated superior accuracy in LRD parameter estimation. Adoption of this tool allows to attain unprecedented precision and fineness in characterizing the LRD of LB regulated traffic. In addition, the probability that LRD traffic is dropped by policers or that it exceeds a delay limit in shapers is also studied. The queuing behaviour of LRD regulated traffic in FIFO schedulers is finally investigated, highlighting conditions under which a service level agreement based on delay bounds can be violated by varying a in input LRD traffic, even if this is controlled by policers or shapers
    corecore