This title appears in the Scientific Report :
2005
Please use the identifier:
http://dx.doi.org/10.1016/j.comcom.2004.10.005 in citations.
Traffic Shaping in Aggregate-Based Networks: Implementation and Analysis
Traffic Shaping in Aggregate-Based Networks: Implementation and Analysis
The Differentiated Services architecture allows providing scalable Quality of Service by means of aggregating flows to a small number of traffic classes. Among these classes a Premium Service is defined, for which end-to-end delay guarantees are of particular interest. However, in aggregate scheduli...
Saved in:
Personal Name(s): | Fidler, M. |
---|---|
Sander, V. / Klimala, W. | |
Contributing Institute: |
Zentralinstitut für Angewandte Mathematik; ZAM |
Published in: | Computer communications, 28 (2005) S. 274 - 286 |
Imprint: |
Amsterdam [u.a.]
Elsevier Science
2005
|
Physical Description: |
274 - 286 |
DOI: |
10.1016/j.comcom.2004.10.005 |
Document Type: |
Journal Article |
Research Program: |
Betrieb und Weiterentwicklung des Höchstleistungsrechners |
Series Title: |
Computer Communications
28 |
Subject (ZB): | |
Publikationsportal JuSER |
The Differentiated Services architecture allows providing scalable Quality of Service by means of aggregating flows to a small number of traffic classes. Among these classes a Premium Service is defined, for which end-to-end delay guarantees are of particular interest. However, in aggregate scheduling networks such delay bounds suffer significantly from effects that are due to multiplexing of flows to aggregates. A way to minimize the impacts of interfering flows is to shape incoming traffic, so that bursts are smoothed. Doing so reduces the queuing delay within the core of a domain, whereas an additional shaping delay at the edge is introduced.This paper addresses the issue of traffic shaping analytically by extending known Network Calculus. An equation that allows computing tight per-flow output bounds in aggregate scheduling networks is derived and a solution for shaped interfering flows is provided. We then give an overview on the shaping capabilities of current legacy routers, showing deviations of actual implementations compared to the idealized view. Finally, the evolved analytical framework is applied to an example scenario and the results are compared to corresponding measurements. (C) 2004 Elsevier B.V. All rights reserved. |