Network Traac Characterization Using Token Bucket Model

نویسنده

  • Tsung-Yuan Charles Tai
چکیده

| This paper investigated the problem of deriving token bucket parameters from the observed traac patterns of computer network ows in two cases. In the basic case, we identiied the set of token bucket parameters for any given ow so that all the packets in the ow will be delivered immediately without incurring any delay or loss. Then, we extended the basic case by adding a queue to the token bucket model to temporarily store packets that cannot be delivered right away until enough tokens get accumulated in the bucket. The queue has the eeect of smoothing the traac so that the resulting token bucket parameters are less demanding. It also makes the derived token bucket parameters less uctuated over time. Relationship among the queue size and token bucket parameters for a given ow are analyzed rigorously. Queuing delay for each packet in the ow is calculated and used to describe the adjusted post-queuing traac pattern. Simple and eecient algorithms for the derivation of measurement-based traac speciication (MBTS) are presented, along with empirical results. This MBTS technology alleviates the need for users to explicitly characterize the traac a priori in order to reserve network resource in an integrated services network. I. Introduction A. Conventions and problems Computer networks of integrated services, which provide multiple-level and dynamically selectable qualities of service (QoS) for diierent classes of traac, rely on sophisticated network resource reservation and management technologies. To fullll the service guarantee in an integrated services network 3], network traac needs to be characterized a priori in terms of some deterministic or stochastic traac models. This traac characterization provides a bounding envelope on the traac pattern that can be injected by the source to the network, and needs to be communicated to the network for resource reservation and admission control purposes. This paper focuses on the token bucket model (see 13, 9]) as adopted by the Internet Engineering Task Force (IETF) Integrated Services (IntServ) working group. One of the main challenges for such traac characterization is to derive token

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Randomized Token Buckets : Reducing the Bu ers Required in

We study the buuer requirements for N identical token bucket streams that are fed to a multiplexor. If the token bucket streams are synchronized the buuer size requirement at the multiplexor is N B, where B is the size of the token bucket. We introduce a new variant of token bucket schemes that we call randomized token bucket schemes that insert random delays to prevent the streams from becomin...

متن کامل

Congestion Control by Traac Shaping for Ground/satellite Network

This paper discusses the issues to consider when selecting congestion control scheme for an integrated ground radio and satellite network engaging primarily in transmitting multi-media traac, and then it proceeds to discuss eeects (both positive and negative) of smoothing rendered on the input traac as a congestion control scheme. We chose traac shaping by smoothing rendered on the input traac ...

متن کامل

{ A Simulation Study Of Token Generation Policies

This paper presents a simulation study of diierent token generation policies for a leaky bucket traac shaper. In particular, the paper addresses the following question: Can the performance of a leaky bucket traac shaper be improved by matching the token generation policy to the characteristics of the input traac? Three diierent token generation policies are considered: Deterministic, Bernoulli,...

متن کامل

Network Traffic Characterization Using Token Bucket Model

This paper investigated the problem of deriving token bucket parameters from the observed traffic patterns of computer network flows in two cases. In the basic case, we identified the set of token bucket parameters for any given flow so that all the packets in the flow will be delivered immediately without incurring any delay or loss. Then, we extended the basic case by adding a queue to the to...

متن کامل

On the Departure Process of a Leaky Bucket System with Long-range Dependent Input Traac

Due to the strong experimental evidence that the traac to be ooered to future broadband networks will display long-range dependence, it is important to study the possible implications that such traac may have for the design and performance of these networks. In particular, an important question is whether the ooered traac preserves its long-range dependent nature after passing through a policin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999