Providing QoS for Real-time Applications - CiteSeerX
Recommend Documents
ily deployable and best effort in nature network service. The tremendous ... integrated in WinSock2 from Microsoft, and the QoS Application Programming Inter-.
each user process to make certain QoS decisions based on its local context. ... multicast transfer, and in the following sections, we will show how multicast ...
ily deployable and best effort in nature network service. The tremendous ... provides the interface to setup and control QoS in the IntServ model. There are a lot.
Vinod Sharma, A. Anil Kumar, S. R. Sandeep, ..... Robin). Based on the solution of the routing and scheduling algo- rithm we know the fraction αp(s, d) of total ...
data transfer requirements and the quality of their links to their neighbours. ... the topology information along with the requirements of each MSS to decide the .... MSS d. This is the sum of mean throughput required by all the real time and data ..
Jun 17, 2008 - The effect of packet jitter can be reduced in real-time voice ... Jeffay [1] and Hudson [21] investigate ... cations, over specific communications links, to date there ..... given higher bandwidth, the packet transit delay is reduced.
event delivery, including TCP/IP, SMTP, HTTP, Java RMI, XMLRPC, SOAP, and ...... Priority. Description. Bulk. 0 any non-management best-effort data. Beacon.
... on-demand multime- dia retrieval, require quality of service (QoS) guarantees .... outside interference, the wireles
QoS is not intrinsic in most of todays NoC solutions, although it is crucial for .... vidual classes to provide traffic of each class with the QoS level appropriate to the ...
Semi centralized models as typified by Napster [7], SETI [8] and Kazaa [9] are based on central servers. In the case of Napster, such servers are indexing servers ...
of a general QoS architecture for assuring QoS. ... QoS or heterogeneity due to network architecture. ... increasingly difficult to support in ad hoc or mobile net-.
applications through well-defined object-based interfaces. In order to be deployed ... tools for the development of distributed applications. This middleware hides ...
enhances the QoS of BoT applications executed on BE-DCIs by reducing the execution time, .... SpeQuloS in the scope of the European Desktop Grid Initiative.
Abstract. Many of the world's most critical systems are distrib- .... Typical CPU and network resource allocation is based on ..... communicating the imagery off-board) on the UAV; and .... Diffserv component and the container and ORB ensure.
calculated from the analysis of M/D/1/B system taking into account the assumed target packet loss ratio and buffer size [9]. In case of TCL2 traffic class the Rate ...
be kept in a Management Information Base (MIB) in the network and a very simple .... profiles (i.e. committed and peak information rate), burst, delay, flexibility to ...
Dec 5, 2007 - In this paper, we will define a dynamic method that enable QoS mapping ... as for example Pulses Code Modulation, which defines a coding of ...
QoS-aware Application Programming Interface (API) design and. QoS specification .... trol and customize the quality of their applications. One com- mon way is ...
is characterized as traffic in which short term bandwidth ex- ceeds the average ... We have developed a traffic shaping software program called PSPacer [2] .... FPGA, functions such as traffic monitoring, traffic shaping, and WAN emulation can ...
GMD-FOKUS, Kaiserin-Augusta-Allee 31, D-10589 Berlin, Germany ... configuration example, service modules can be encapsulated in the form of code ..... Campbell A.T., "QOS Architectures" ,(Eds.) M. Tatipamula and B. Khasnabish, Multime-.
Official Full-Text Paper (PDF): Optimal Design of Wireless Sensor Network for Providing ... With respect to the increase in demand of wireless sensor network in various real time Application. ..... particular sensor with the minimal network cost.
Mar 11, 2009 - Keywords: QoS, Self-healing, Web service, Monitoring,. Analysis. 1. ... composite systems where design-time requirement analysis solutions are no ..... the whole set of involved web services, on the basis of the received .... available
data-centers which host multiple web-sites or services. Over-provisioning of nodes in ..... determine the best configuration for the data-center at any point in time.
to enhance the network operator service. WLANs operate at ... solution to conquer such a problem. ... serious studies addressing QoS solutions to the integrated.
Providing QoS for Real-time Applications - CiteSeerX
Department of Electrical Engineering and Computer Sciences. University of ..... We use IBM Thinkpad laptops and wired Ethernet cards to implement our ...
Providing QoS for Real-time Applications Teresa Tung, Jean Walrand Department of Electrical Engineering and Computer Sciences University of California, Berkeley, CA 94720 teresat, wlr@eecs.berkeley.edu
¯
Preserve the ability to serve elastic traffic. Provide fair resource allocation in the sense that neither real-time traffic nor elastic traffic monopolizes network resources. The scheme has the following additional objectives: ¯ Minimize packet loss to make retransmissions less frequent and improve the throughput of the network. ¯ The scheme should admit a simple implementation that does not require complex signaling nor a centralized manager. This paper is organized as follows. Section 2 describes Index Terms—Quality of service, Congestion Control. the scheme. The scheme combines previously proposed ideas in a new way that enables the estimate of its performance. Section 3 provides a theoretical analysis of I. I NTRODUCTION the performance of time-sensitive applications. Section Internet accommodates many types of traffic. These 4 presents simulation results. Section 5 describes an imtypes can be categorized as real-time and elastic. Elasplementation on a test network. Section 6 concludes with tic traffic refers to that of applications where the transmitrelated work and deployment issues. ted information is not time sensitive, but requires eventual correct delivery. Examples of applications that genII. P ROVIDING Q O S TO EF T RAFFIC erate elastic traffic are email, web-browsing, file transfers (FTP), Telnet, and any application that works without This section describes a networking scheme that baltimely delivery. Internet accommodates elastic traffic very ances the needs of applications wtih real-time and elastic well. Protocols like TCP control the transmission rate of traffic. elastic traffic and allow for reliable transmission. Consider VoIP as a representative time-sensitive appliReal-time traffic refers to that of applications where cation. If the network cannot guarantee a small latency the transmitted information is only useful if it is received for a VoIP call, it should block that call. The network can within a small delay. Such traffic often does not benefit block the call with a busy signal as in the public switched from retransmissions of lost packets since they would ar- telephone network. This observation suggests that the netrive too late. Examples of applications that generate real- work should control real-time traffic by some admission time traffic are voice over IP (VoIP), video conferences, control policy based on the latency. and generally any application that requires small end-toIn contrast with real-time traffic, the network can adend delay. Internet does not cater well to the time con- just the transmission of elastic traffic with a congestion straints needed by such real-time applications. There is control policy and does not need to subject such traffic to significant interest in developing an Internet that can ac- admission control. comodate real-time applications. We study the feasibility of a scheme that uses packet This paper studies a scheme to guarantee low end-to- marking based on virtual queues for feedback congestion end delay and loss rate for latency-sensitive traffic without control and admission control. When it gets congested, a reducing the Internet’s ability to transport elastic traffic router marks a packet by turning on a bit in the header of efficiently. The main goals are the following: the packet. The Random Early Detection (RED) scheme ¯ Minimize the queuing delay of time-sensitive flows. is an example of a scheme used to determine the onset of
Abstract—This paper describes a framework for packetswitched networks that balances the needs of real-time and data applications. Routers use virtual queues to mark packets reflecting a measure of congestion. These marks are then used to control the admission of time-sensitive traffic and to regulate other traffic. We present a theoretical analysis of this framework. We evaluate the performance characteristics of this approach in terms of overall link utilization and quality of service of the time-sensitive traffic. We conclude with a discussion of simulation results and of an implementation on a test network.
¯
congestion and to mark packets [8]. Using virtual queues with reduced transmission rates to track the operations of the router with is another method of predicting congestion and marking packets. We study a virtual queue scheme which we describe later. Our scheme subjects elastic traffic to a congestion control scheme that reacts to packet marking. TCP with ECN (Explicit Congestion Notification) is a congestion control scheme ideal for controlling elastic traffic [7]. TCP with ECN reacts to marked packets as if they were dropped packets, by decreasing of the transmission rate of the flow. Using virtual queues, TCP with ECN can decrease a flow’s transmission rate before the router queue builds up. An admission control policy based on packet marking governs the time-sensitive flows. Gibbens and Kelly propose an admission control scheme for time-sensitive traffic where decisions are made in a distributed manner by the source and the destination [10]. We study the same admission control policy as Gibbens and Kelly: the systems we study respond to marked packets in the same manner. However our work differs in how routers mark packets. Gibbens and Kelly study a generalized packet marking scheme. We study a specific scheme using virtual queues for which we can provide more detailed analysis. We investigate the admission control scheme using packet marking based on a specific configuration of virtual queues for which we offer a unique theoretical interpretation, simulation results, and experimental results. These previously proposed schemes have been studied separately using a packet marking system. We study the combination of these congestion control and admission control schemes using a packet marking system based on a pair of virtual queues. Next, we describe the suggested behavior of the router, the source, and the destination.