1 / 13

Dynamic Resource Management Considering the Real Behavior of Aggregate Traffic

Dynamic Resource Management Considering the Real Behavior of Aggregate Traffic. Jos é R. Gallardo, Dimitrios Makrakis, and Marlenne Angulo IEEE Transaction on Multimedia, VOL. 3, NO. 2, June 2001. Outline. Motivation and Goal Dynamic traffic control using predictive techniques

sissy
Download Presentation

Dynamic Resource Management Considering the Real Behavior of Aggregate Traffic

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Dynamic Resource Management Considering the Real Behavior of Aggregate Traffic José R. Gallardo, Dimitrios Makrakis, and Marlenne Angulo IEEE Transaction on Multimedia, VOL. 3, NO. 2, June 2001 Chin-Kai Wu, CS, NTHU

  2. Outline • Motivation and Goal • Dynamic traffic control using predictive techniques • Differentiated Service • Model • Traffic policing and resource allocation algorithms • Simulation Parameters and Results Chin-Kai Wu, CS, NTHU

  3. Motivation and Goal • Theory of effective bandwidth • The probability of buffer overflow in a stationary queueing system decreases exponentially with the buffer size as long as the “effective bandwidth” of the input traffic stream is smaller than the server capacity • Goal • Propose an alternative dynamic approach to resource allocation and management Chin-Kai Wu, CS, NTHU

  4. Differentiated Service Chin-Kai Wu, CS, NTHU

  5. Model marker Chin-Kai Wu, CS, NTHU

  6. Traffic policing • Two different policing mechanisms that are based on the leaky bucket idea: conventional leaky bucketand adaptive leaky bucket assisted by traffic prediction. • The purpose is to optimize the resource utilization, which in turn intends to minimize the number of violations to the QoS requirements of the traffic. Chin-Kai Wu, CS, NTHU

  7. Packets arrive Generate token each constant time NO YES Buffer full YES Pool full Got Token NO NO YES Drop Put Drop Send Wait Conventional Leaky Bucket (CLB) Chin-Kai Wu, CS, NTHU

  8. Adaptive Leaky Bucket Assisted by Traffic Prediction (PALB) Buffer occupancy above upper bond YES NO Buffer occupancy below lower bond Increase generation rate NO YES Maintain generation rate Decrease generation rate Chin-Kai Wu, CS, NTHU

  9. Simulation Parameters Chin-Kai Wu, CS, NTHU

  10. Chin-Kai Wu, CS, NTHU

  11. Results Chin-Kai Wu, CS, NTHU

  12. Chin-Kai Wu, CS, NTHU

  13. Chin-Kai Wu, CS, NTHU

More Related