• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 2
  • 1
  • Tagged with
  • 7
  • 7
  • 4
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Distributed Policing with Full Utilization and Rate Guarantees

Choi, Albert C. B. January 2009 (has links)
A network service provider typically sells service at a fixed traffic rate to customers. This rate is enforced by allowing or dropping packets that pass through, in a process called policing. Distributed policing is a version of the problem where a number of policers must limit their combined traffic allowance to the specified rate. The policers must coordinate their behaviour such that customers are fully allowed the rate they pay for, without receiving too much more, while maintaining some semblance of fairness between packets arriving at one policer versus another. A review of prior solutions shows that most use predictions or estimations to heuristically allocate rates, and thus cannot provide any error bounds or guarantees on the achieved rate under all scenarios. Other solutions may suffer from starvation or unfairness under certain traffic demand patterns. We present a new global ``leaky bucket'' approach that provably prevents starvation, guarantees full utilization, and provides a simple upper bound on the rate allowed under any incoming traffic pattern. We find that the algorithm guarantees a minimum 1/n share of the rate for each policer, and achieves close to max-min fairness in many, but not all cases. We also suggest some experimental modifications that could improve the fairness in practice.
2

Distributed Policing with Full Utilization and Rate Guarantees

Choi, Albert C. B. January 2009 (has links)
A network service provider typically sells service at a fixed traffic rate to customers. This rate is enforced by allowing or dropping packets that pass through, in a process called policing. Distributed policing is a version of the problem where a number of policers must limit their combined traffic allowance to the specified rate. The policers must coordinate their behaviour such that customers are fully allowed the rate they pay for, without receiving too much more, while maintaining some semblance of fairness between packets arriving at one policer versus another. A review of prior solutions shows that most use predictions or estimations to heuristically allocate rates, and thus cannot provide any error bounds or guarantees on the achieved rate under all scenarios. Other solutions may suffer from starvation or unfairness under certain traffic demand patterns. We present a new global ``leaky bucket'' approach that provably prevents starvation, guarantees full utilization, and provides a simple upper bound on the rate allowed under any incoming traffic pattern. We find that the algorithm guarantees a minimum 1/n share of the rate for each policer, and achieves close to max-min fairness in many, but not all cases. We also suggest some experimental modifications that could improve the fairness in practice.
3

Switched multi-hop FCFS networks - the influence of traffic shapers on soft real-time performance

Tirmazi, Syed Hasnain Raza, Sharma, Shashank January 2010 (has links)
<p>In the past 10 years, the bandwidths and processing capabilities of the networks have increased dramatically. The number of real-time applications using these networks has also increased. The large number of real-time packets might, in a switched multi-hop network, lead to unpredictable traffic patterns. This is not a problem when the traffic intensity is low, but if the same network is used by a large number of users simultaneously, the overall performance of the network degrades. In fact, unpredictable delays in the delivery of the message can adversely affect the execution of the tasks dependent on these messages, even if we take into account the soft real-time performance.</p><p>In this paper, we investigate the effect of traffic shapers on soft real-time performance. We will consider a switched multi-hop network with FCFS queues. We will implement two versions of the network simulator. One version will be without traffic shaper and the other version will use a traffic shaper. By comparing the results (for average delay, deadline miss ratio etc.) from both the versions, we will try to conclude if it is really beneficial to use traffic shapers for soft real-time performance. Leaky bucket and token bucket algorithms are the most popular ones for traffic shaper implementation. We will consider leaky bucket algorithm for our analysis. We analyse different versions of the leaky bucket and present the trade-off’s involved.</p>
4

Switched multi-hop FCFS networks - the influence of traffic shapers on soft real-time performance

Tirmazi, Syed Hasnain Raza, Sharma, Shashank January 2010 (has links)
In the past 10 years, the bandwidths and processing capabilities of the networks have increased dramatically. The number of real-time applications using these networks has also increased. The large number of real-time packets might, in a switched multi-hop network, lead to unpredictable traffic patterns. This is not a problem when the traffic intensity is low, but if the same network is used by a large number of users simultaneously, the overall performance of the network degrades. In fact, unpredictable delays in the delivery of the message can adversely affect the execution of the tasks dependent on these messages, even if we take into account the soft real-time performance. In this paper, we investigate the effect of traffic shapers on soft real-time performance. We will consider a switched multi-hop network with FCFS queues. We will implement two versions of the network simulator. One version will be without traffic shaper and the other version will use a traffic shaper. By comparing the results (for average delay, deadline miss ratio etc.) from both the versions, we will try to conclude if it is really beneficial to use traffic shapers for soft real-time performance. Leaky bucket and token bucket algorithms are the most popular ones for traffic shaper implementation. We will consider leaky bucket algorithm for our analysis. We analyse different versions of the leaky bucket and present the trade-off’s involved.
5

Measurement Based Optimal Source Shaping In Integrated Services Packet Networks

Dube, Parijat 10 1900 (has links) (PDF)
No description available.
6

Simulação e análise comparativa dos métodos do mecanismo de policiamento dual leaky bucket em chaves ATM para classe de serviço VBR para tráfegos de vídeo / Not available

Pereira, Michelle Miranda 16 October 2002 (has links)
A garantia de qualidade de serviço (QoS) tem-se demonstrado muito importante em aplicações em tempo real. Este trabalho apresenta um estudo sobre Mecanismos de Policiamento na tecnologia A TM, mais especificamente, sobre o funcionamento do Mecanismo Dual Leaky Bucket, utilizado pela classe de serviço VBR em rede ATM. Para este estudo foi implementado um simulador por software do mecanismo Dual Leaky Bucket. Foram analisados dois tipos de tráfegos de vídeo com compressão MPEG-2, com pouca e muita movimentação. A partir da simulação pôde-se analisar como o erro na definição de parâmetros do contrato de QoS definidos pelo usuário no estabelecimento da conexão pode levar ao aumento na taxa de perda de informações e, conseqüentemente, a degradação da qualidade necessária pela aplicação / The guarantee of quality of service (QoS) has been demonstrating very important in real time applications. This work presents a study on Policing Mechanisms in the ATM technology, more specifically, on the operation of the Dual Leaky Bucket Mechanism, used by the class of service VBR in ATM networks. For this study a Dual Leaky Bucket mechanism simulator by software was implemented. Two kinds of MPEG-2 video traffics were analyzed with a little and a lot of movement. The simulation shows how a mistake in the definition of parameters in the QoS contract, defined by user, during of the connection establishment can leads to increase of information loss rate and, consequently, the degradation of the necessary quality for the application
7

Simulação e análise comparativa dos métodos do mecanismo de policiamento dual leaky bucket em chaves ATM para classe de serviço VBR para tráfegos de vídeo / Not available

Michelle Miranda Pereira 16 October 2002 (has links)
A garantia de qualidade de serviço (QoS) tem-se demonstrado muito importante em aplicações em tempo real. Este trabalho apresenta um estudo sobre Mecanismos de Policiamento na tecnologia A TM, mais especificamente, sobre o funcionamento do Mecanismo Dual Leaky Bucket, utilizado pela classe de serviço VBR em rede ATM. Para este estudo foi implementado um simulador por software do mecanismo Dual Leaky Bucket. Foram analisados dois tipos de tráfegos de vídeo com compressão MPEG-2, com pouca e muita movimentação. A partir da simulação pôde-se analisar como o erro na definição de parâmetros do contrato de QoS definidos pelo usuário no estabelecimento da conexão pode levar ao aumento na taxa de perda de informações e, conseqüentemente, a degradação da qualidade necessária pela aplicação / The guarantee of quality of service (QoS) has been demonstrating very important in real time applications. This work presents a study on Policing Mechanisms in the ATM technology, more specifically, on the operation of the Dual Leaky Bucket Mechanism, used by the class of service VBR in ATM networks. For this study a Dual Leaky Bucket mechanism simulator by software was implemented. Two kinds of MPEG-2 video traffics were analyzed with a little and a lot of movement. The simulation shows how a mistake in the definition of parameters in the QoS contract, defined by user, during of the connection establishment can leads to increase of information loss rate and, consequently, the degradation of the necessary quality for the application

Page generated in 0.0428 seconds