IEEE/ACM Transactions on Networking (TON)
IEEE/ACM Transactions on Networking (TON)
Second moment resource allocation in multi-service networks
SIGMETRICS '97 Proceedings of the 1997 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
An engineering approach to computer networking: ATM networks, the Internet, and the telephone network
A central-limit-theorem-based approach for analyzing queue behavior in high-speed networks
IEEE/ACM Transactions on Networking (TON)
New directions in communications (or which way to the information age?)
IEEE Communications Magazine
A practical approach for providing QoS in the Internet backbone
IEEE Communications Magazine
Token bucket characterization of long-range dependent traffic
Computer Communications
A scheme for real-time channel establishment in wide-area networks
IEEE Journal on Selected Areas in Communications
On the use of fractional Brownian motion in the theory of connectionless networks
IEEE Journal on Selected Areas in Communications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Closed-form analysis of end-to-end network delay with Markov-modulated Poisson and fluid traffic
Computer Communications
Characterization of long-range dependent traffic regulated by leaky-bucket policers and shapers
Computer Communications
End-to-end delay approximation in cascades of generalized processor sharing schedulers
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Multi-timescale economics-driven traffic management in MPLS networks
Network performance engineering
Hi-index | 0.24 |
This paper compares two different approaches for providing QoS in the Internet backbone. The first, denoted as simple approach, is a simple method of Admission Control performed by a weighted-fair-queuing scheduler. This approach guarantees QoS with a suitable overprovisioning of transmission resources. The second approach, denoted as basic statistical approach, is a full-featured statistical framework, based on the central limit approximation, for estimating the delay bound violation probability associated to each traffic class, given the offered traffic and the schedulers' configuration. Both approaches adopt the dual-leaky-bucket (p, r, b) regulated traffic model in order to characterize the aggregate traffic flows. At first, we analyze the characteristics of both approaches in order to point out the respective pros and cons. Then, we propose an enhanced version of the basic statistical approach, the enhanced statistical approach. Our novel approach, as opposed to the basic statistical approach, performs a joint optimization of the regulator's parameters and of the network capacity instead of a separate optimization. Our study shows that the enhanced statistical approach outperforms both the basic statistical approach and the simple approach and offers the highest potential for a better utilization of transmission resources. The basic and the enhanced statistical approaches assume that traffic is Gaussian. The simple approach has looser constraints on the statistical behavior of traffic, but it requires overprovisioning of transmission resources to guarantee the required QoS in terms of packet delay and loss.