Spelling suggestions: "subject:"4traffic shaper"" "subject:"ktraffic shaper""
1 |
Switched multi-hop FCFS networks - the influence of traffic shapers on soft real-time performanceTirmazi, Syed Hasnain Raza, Sharma, Shashank January 2010 (has links)
<p>In the past 10 years, the bandwidths and processing capabilities of the networks have increased dramatically. The number of real-time applications using these networks has also increased. The large number of real-time packets might, in a switched multi-hop network, lead to unpredictable traffic patterns. This is not a problem when the traffic intensity is low, but if the same network is used by a large number of users simultaneously, the overall performance of the network degrades. In fact, unpredictable delays in the delivery of the message can adversely affect the execution of the tasks dependent on these messages, even if we take into account the soft real-time performance.</p><p>In this paper, we investigate the effect of traffic shapers on soft real-time performance. We will consider a switched multi-hop network with FCFS queues. We will implement two versions of the network simulator. One version will be without traffic shaper and the other version will use a traffic shaper. By comparing the results (for average delay, deadline miss ratio etc.) from both the versions, we will try to conclude if it is really beneficial to use traffic shapers for soft real-time performance. Leaky bucket and token bucket algorithms are the most popular ones for traffic shaper implementation. We will consider leaky bucket algorithm for our analysis. We analyse different versions of the leaky bucket and present the trade-off’s involved.</p>
|
2 |
Switched multi-hop FCFS networks - the influence of traffic shapers on soft real-time performanceTirmazi, Syed Hasnain Raza, Sharma, Shashank January 2010 (has links)
In the past 10 years, the bandwidths and processing capabilities of the networks have increased dramatically. The number of real-time applications using these networks has also increased. The large number of real-time packets might, in a switched multi-hop network, lead to unpredictable traffic patterns. This is not a problem when the traffic intensity is low, but if the same network is used by a large number of users simultaneously, the overall performance of the network degrades. In fact, unpredictable delays in the delivery of the message can adversely affect the execution of the tasks dependent on these messages, even if we take into account the soft real-time performance. In this paper, we investigate the effect of traffic shapers on soft real-time performance. We will consider a switched multi-hop network with FCFS queues. We will implement two versions of the network simulator. One version will be without traffic shaper and the other version will use a traffic shaper. By comparing the results (for average delay, deadline miss ratio etc.) from both the versions, we will try to conclude if it is really beneficial to use traffic shapers for soft real-time performance. Leaky bucket and token bucket algorithms are the most popular ones for traffic shaper implementation. We will consider leaky bucket algorithm for our analysis. We analyse different versions of the leaky bucket and present the trade-off’s involved.
|
3 |
Time controlled network traffic shaper / Time controlled network traffic shaperYousuf, Kamran January 2010 (has links)
Network performance metrics such as delay variations and packet loss influence the performance of the network. As a consequence, the performance of applications on the network is also affected as most of the networked applications existing today are very much sensitive to the network performance. Therefore it is of utmost importance to test the intensity of such network level disturbances on the performance of applications. A network traffic shaper/emulator shapes the network traffic in terms of these performance metrics to test such applications in a controlled environment. Most of the traffic shapers existing today give the instantaneous step transition in delay and packet loss on network. In this work, we present time-controlled network traffic shaper, a tool that facilitates testing and experimentation of network traffic through emulation. It focuses on time variant behavior of the traffic shaper. A linear transition of delay and packet loss that is varying with respect to time may fits much better to the real network scenarios instead of an instantaneous step transition in delay and packet loss. This work illustrates the emulation capabilities of time-controlled network traffic shaper and presents its design architecture. Several approaches are analyzed to do the task and one of them is followed to develop the desired architecture of the shaper. The shaper is implemented in a small scenario and is tested to see whether the desired output is achieved or not. The shortfalls in the design of the shaper are also discussed. Results are presented that show the output from the shaper in graphical form. Although the current implementation of the shaper does not provide linear or exponential output but this can be achieved by implementing a configuration setting that is comprised of small transition values that are varying with respect to very small step sizes of time e.g. transitions on milli seconds or micro seconds. The current implementation of the shaper configuration provides the output with a transition of one milli second on every next second. / kami1219@gmail.com
|
4 |
Third-Party TCP Rate ControlBansal, Dushyant January 2005 (has links)
The Transmission Control Protocol (TCP) is the dominant transport protocol in today?s Internet. The original design of TCP left congestion control open to future designers. Short of implementing changes to the TCP stack on the end-nodes themselves, Internet Service Providers have employed several techniques to be able to operate their network equipment efficiently. These techniques amount to shaping traffic to reduce cost and improve overall customer satisfaction. <br /><br /> The method that gives maximum control when performing traffic shaping is using an inline traffic shaper. An inline traffic shaper sits in the middle of any flow, allowing packets to pass through it and, with policy-limited freedom, inspects and modifies all packets as it pleases. However, a number of practical issues such as hardware reliability or ISP policy, may prevent such a solution from being employed. For example, an ISP that does not fully trust the quality of the traffic shaper would not want such a product to be placed in-line with its equipment, as it places a significant threat to its business. What is required in such cases is third-party rate control. <br /><br /> Formally defined, a third-party rate controller is one that can see all traffic and inject new traffic into the network, but cannot remove or modify existing network packets. Given these restrictions, we present and study a technique to control TCP flows, namely triple-ACK duplication. The triple-ACK algorithm allows significant capabilities to a third-party traffic shaper. We provide an analytical justification for why this technique works under ideal conditions and demonstrate via simulation the bandwidth reduction achieved. When judiciously applied, the triple-ACK duplication technique produces minimal badput, while producing significant reductions in bandwidth consumption under ideal conditions. Based on a brief study, we show that our algorithm is able to selectively throttle one flow while allowing another to gain in bandwidth.
|
5 |
Third-Party TCP Rate ControlBansal, Dushyant January 2005 (has links)
The Transmission Control Protocol (TCP) is the dominant transport protocol in today?s Internet. The original design of TCP left congestion control open to future designers. Short of implementing changes to the TCP stack on the end-nodes themselves, Internet Service Providers have employed several techniques to be able to operate their network equipment efficiently. These techniques amount to shaping traffic to reduce cost and improve overall customer satisfaction. <br /><br /> The method that gives maximum control when performing traffic shaping is using an inline traffic shaper. An inline traffic shaper sits in the middle of any flow, allowing packets to pass through it and, with policy-limited freedom, inspects and modifies all packets as it pleases. However, a number of practical issues such as hardware reliability or ISP policy, may prevent such a solution from being employed. For example, an ISP that does not fully trust the quality of the traffic shaper would not want such a product to be placed in-line with its equipment, as it places a significant threat to its business. What is required in such cases is third-party rate control. <br /><br /> Formally defined, a third-party rate controller is one that can see all traffic and inject new traffic into the network, but cannot remove or modify existing network packets. Given these restrictions, we present and study a technique to control TCP flows, namely triple-ACK duplication. The triple-ACK algorithm allows significant capabilities to a third-party traffic shaper. We provide an analytical justification for why this technique works under ideal conditions and demonstrate via simulation the bandwidth reduction achieved. When judiciously applied, the triple-ACK duplication technique produces minimal badput, while producing significant reductions in bandwidth consumption under ideal conditions. Based on a brief study, we show that our algorithm is able to selectively throttle one flow while allowing another to gain in bandwidth.
|
Page generated in 0.0617 seconds