Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Capacity overprovisioning for networks with resilience requirements

Published: 11 August 2006 Publication History

Abstract

This work focuses on capacity overprovisioning (CO) as an alternative to admission control (AC) to implement quality of service (QoS) in packet-switched communication networks. CO prevents potential overload while AC protects the QoS of the traffic during overload situations. Overload may be caused, e. g., by uctuations of the traffic rate on a link due to its normal stochastic behavior (a), by traffic shifts within the network due to popular contents (b), or by redirected traffic due to network failures (c). Capacity dimensioning methods for CO need to take into account all potential sources of overload while AC can block excess traffic caused by (a) and (b) if the capacity does not suffice. The contributions of this paper are (1) the presentation of a capacity dimensioning method for networks with resilience requirements and changing traffic matrices, (2) the investigation of the impact of the mentioned sources of overload (a-c) on the required capacity for CO in networks with and without resilience requirements, and (3) a comparison of this equired capacity with the one for AC. Our results show that in the presence of strong traffic shifts CO requires more capacity than AC. However, if resilience against network failures is required, both CO and AC need additional backup capacity for the redirected traffic. In this case, CO can use the backup capacity to absorb other types of overload. As a consequence, CO and AC have similar bandwidth requirements. These findings are robust against the network size.

References

[1]
A. Autenrieth and A. Kirstädter. Engineering End-to-End IP Resilience Using Resilience-Differentiated QoS. IEEE Communications Magazine, 40(1):50--57, Jan. 2002.
[2]
J. Beran, R. Sherman, M. Taqqu, and W. Willinger. Long-Range Dependence in Variable-Bit Rate Video Traffic. IEEE Transactions on Communications, 43(2/3/4):1566--1579, Feb. 1995.
[3]
N. Blefari-Melazzi and M. Femminella. Stateful vs. Stateless Admission Control: Which Can Be the Gap in Utilization Efficiency? In IEEE Infocom, Nov. 2002.
[4]
L. Breslau and S. Shenker. Best-Effort versus Reservations: A Simple Comparative Analysis. ACM SIGCOMM Computer Communications Review, 28:3--16, Sept. 1998.
[5]
J. Cao, W. S. Cleveland, D. Lin, and D. X. Sun. On the Nonstationarity of Internet Traffic. In ACM SIGMETRICS, 2001.
[6]
J. Cao, W. S. Cleveland, D. Lin, and D. X. Sun. Nonlinear Estimation and Classification, chapter Internet Traffic Tends Toward Poisson and Independent as the Load Increases. Springer, New York, 2002.
[7]
J. Cao and K. Ramanan. A Poisson Limit for Buffer Over ow Probabilities. In IEEE Infocom, 2002.
[8]
J. Choe and N. Shroff. A Central Limit Theorem based Approach for Analyzing Queue Behavior in High Speed Networks. IEEE/ACM Transactions on Networking, 6(5):659--671, Oct. 1998.
[9]
M. E. Crovella and A. Bestavros. Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes. IEEE/ACM Transactions on Networking, 5(6), Dec. 1997.
[10]
T. Dinh, B. Sonkoly, and S. Molnár. Fractal Analysis and Modeling of VoIP Traffic. In International Telecommunication Network Strategy and Planning Symposium (Networks), pages 123--130, Vienna, Austria, June 2004.
[11]
C. Fraleigh, F. Tobabi, and C. Diot. Provisioning IP Backbone Networks to Support Latency Sensitive Traffic. In IEEE Infocom, Apr. 2003.
[12]
M. Grossglauser and J.-C. Bolot. On the Relevance of Long-Range Dependence in Network Traffic. IEEE/ACM Transactions on Networking, 7(5):629--640, Oct. 1999.
[13]
M. Grossglauser and D. N. C. Tse. A Framework for Robust Measurement-Based Admission Control. IEEE/ACM Transactions on Networking, 7(3):293--309, 1999.
[14]
O. Heckmann and J. Schmitt. Best-Effort versus Reservations Revisited. In 13th IEEE International Workshop on Quality of Service (IWQoS), Passau, Germany, June 2005.
[15]
S. Jamin, P. Danzig, S. J. Shenker, and L. Zhang. Measurement-Based Admission Control Algorithms for Controlled-Load Services Packet Networks. In ACM SIGCOMM, 1995.
[16]
F. P. Kelly. Stochastic Networks: Theory and Applications, volume 4, chapter Notes on Effective Bandwidths, pages 141--168. Oxford University Press, 1996.
[17]
E. Knightly and N. Shroff. Admission Control for Statistical QoS: Theory and Practice. IEEE Network Magazine, 13(2):20--29, 1999.
[18]
W. E. Leland, M. S. Taqqu, W. Willinger, and D. V. Wilson. On the Self-Similar Nature of Ethernet Traffic (Extended Version). IEEE/ACM Transactions on Networking, 2(2), Feb. 1994.
[19]
A. Markopoulou, G. Iannaccone, S. Bhattacharyya, and C.-N. Chuah. Characterization of Failures in an IP Backbone. In IEEE Infocom, Hongkong, Mar. 2004.
[20]
R. Martin, M. Menth, and J. Charzinski. Comparison of Border-to-Border Budget Based Network Admission Control and Capacity Overprovisioning. In 4th IFIP-TC6 Networking Conference (Networking), pages 1056--1068, Waterloo, Canada, May 2005.
[21]
M. Menth. Efficient Admission Control and Routing in Resilient Communication Networks. PhD thesis, University of Würzburg, Faculty of Computer Science, Am Hubland, July 2004.
[22]
M. Menth, J. Milbrandt, and S. Oechsner. Experience-Based Admission Control (EBAC). In 9th IEEE Symposium on Computers and Communications (ISCC), pages 903--910, Alexandria, Egypt, June 2004.
[23]
K. Murakami and H. S. Kim. Optimal Capacity and Flow Assignment for Self-Healing ATM Networks Based on Line and End-to-End Restoration. IEEE/ACM Transactions on Networking, 6(2):207--221, Apr. 1998.
[24]
K. Nichols, V. Jacobson, and L. Zhang. RFC2638: A Two-Bit Differentiated Services Architecture for the Internet, July 1999.
[25]
P. Pan, G. Swallow, and A. Atlas. RFC4090: Fast Reroute Extensions to RSVP-TE for LSP Tunnels, May 2005.
[26]
K. Papagiannaki, N. Taft, Z.-L. Zhang, and C. Diot. Long-Term Forecasting of Internet Backbone Traffic: Observations and Initial Models. In IEEE Infocom, San Francisco, CA, Apr. 2003.
[27]
V. Paxson and S. Floyd. Wide-Area Traffic: The Failure of Poisson Modeling. IEEE/ACM Transactions on Networking, 3(3):226--244, June 1995.
[28]
A. Pras, R. van de Meent, and M. Mandjes. QoS in Hybrid Networks An Operator's Perspective. In 13th IEEE International Workshop on Quality of Service (IWQoS), Passau, Germany, June 2005.
[29]
J. Roberts, U. Mocci, and J. Virtamo. Broadband Network Teletraffic - Final Report of Action COST 242. Springer, Berlin, Heidelberg, 1996.
[30]
J. W. Roberts. Traffic Theory and the Internet. IEEE Communications Magazine, 1(3):94--99, Jan. 2001.
[31]
K. W. Ross and D. H. K. Tsang. The Stochastik Knapsack Problem. IEEE/ACM Transactions on Networking, 37(7):740--747, 1989.
[32]
T. Schwabe and C. G. Gruber. Traffic Variations Caused by Inter-domain Re-routing. In International Workshop on the Design of Reliable Communication Networks (DRCN), Ischia Island, Italy, Oct. 2005.
[33]
S. Shenker. Fundamental Design Issues for the Future Internet. IEEE Journal on Selected Areas in Communications, 13(7):1176--1188, Sept. 1995.
[34]
I. Stoica and H. Zhang. Providing Guaranteed Services without per Flow Management. ACM SIGCOMM Computer Communications Review, 29(4), Oct. 1999.
[35]
R. Szábó, T. Henk, V. Rexhepi, and G. Karagiannis. Resource Management in Differentiated Services (RMD) IP Networks. In International Conference on Emerging Telecommunications Technologies and Applications (ICETA 2001), Kosice, Slovak Republic, Oct. 2001.
[36]
H. Tuan Tran and T. Ziegler. Adaptive Bandwidth Provisioning with Explicit Respect to QoS Requirements. In International Workshop on Quality of future Internet Services (QofIS), Stockholm, Sweden, Oct. 2003.
[37]
R. van de Meent and M. Mandjes. Evaluation of 'User-Oriented' and 'Black Box' Traffic Models for Link Provisioning. In 1st Conference on Next Generation Internet Design and Engineering (NGI), Rome, Italy, Apr. 2005.
[38]
R. van de Meent, A. Pras, M. Mandjes, H. van den Berg, and L. Nieuwenhuis. Traffic Measurement for Link Dimensioning: A Case Study. In 14th IFIP/IEEE Workshop on Distributed Systems: Operations and Management (DSOM), pages 106--117, Oct. 2003.
[39]
H. van den Berg, M. Mandjes, R. van de Meent, A. Pras, F. Roijers, and P. Venemans. QoS-Aware Bandwidth Provisioning for IP Network Links. Computer Networks, 50(5):631--647, Apr. 2006.
[40]
G. van Hoey, D. de Vleeschauwer, B. Steyaert, V. Ingelbrecht, and H. Brunel. Benefit of Admission Control in Aggregation Network Dimensioning for Video Services. In 3rd IFIP-TC6 Networking Conference (Networking), pages 357--368, Athens, Greece, May 2004.
[41]
Z.-L. Zhang, Z. Duan, Y. T. Hou, and L. Gao. Decoupling QoS Control from Core Routers: A Novel Bandwidth Broker Architecture for Scalable Support of Guaranteed Services. In ACM SIGCOMM, pages 71--83, 2000.
[42]
Z.-L. Zhang, V. J. Riberio, S. Moon, and C. Diot. Small-Time Scaling Behaviors of Internet Backbone Traffic: An Empirical Study. In IEEE Infocom, San Francisco, CA, Apr. 2003.

Cited By

View all
  • (2023)DDoS attacks in Industrial IoT: A surveyComputer Networks10.1016/j.comnet.2023.110015236(110015)Online publication date: Nov-2023
  • (2020)Telecommunications network design: Technology impacts and future directionsNetworks10.1002/net.2199777:2(205-224)Online publication date: 16-Oct-2020
  • (2017)A survey of distributed denial-of-service attack, prevention, and mitigation techniquesInternational Journal of Distributed Sensor Networks10.1177/155014771774146313:12(155014771774146)Online publication date: 13-Dec-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGCOMM Computer Communication Review
ACM SIGCOMM Computer Communication Review  Volume 36, Issue 4
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
October 2006
445 pages
ISSN:0146-4833
DOI:10.1145/1151659
Issue’s Table of Contents
  • cover image ACM Conferences
    SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
    September 2006
    458 pages
    ISBN:1595933085
    DOI:10.1145/1159913
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 August 2006
Published in SIGCOMM-CCR Volume 36, Issue 4

Check for updates

Author Tags

  1. QoS
  2. admission control
  3. capacity overprovisioning

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)56
  • Downloads (Last 6 weeks)3
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)DDoS attacks in Industrial IoT: A surveyComputer Networks10.1016/j.comnet.2023.110015236(110015)Online publication date: Nov-2023
  • (2020)Telecommunications network design: Technology impacts and future directionsNetworks10.1002/net.2199777:2(205-224)Online publication date: 16-Oct-2020
  • (2017)A survey of distributed denial-of-service attack, prevention, and mitigation techniquesInternational Journal of Distributed Sensor Networks10.1177/155014771774146313:12(155014771774146)Online publication date: 13-Dec-2017
  • (2017)Strategies to Design Resilient Supply Network StructuresResilience by Teaming in Supply Chains and Networks10.1007/978-3-319-58323-5_4(31-43)Online publication date: 23-May-2017
  • (2013)Using Optimized Virtual Network Embedding for Network DimensioningProceedings of the 2013 Conference on Networked Systems10.1109/NetSys.2013.8(118-125)Online publication date: 11-Mar-2013
  • (2013)Quality of Experience and Quality Of ServiceDigital Home Networking10.1002/9781118602829.ch7(203-257)Online publication date: 27-Feb-2013
  • (2012)Performance of PCN-based admission control under challenging conditionsIEEE/ACM Transactions on Networking10.1109/TNET.2012.218941520:2(422-435)Online publication date: 1-Apr-2012
  • (2012)Precongestion notification: new QoS support for differentiated services IP networksIEEE Communications Magazine10.1109/MCOM.2012.616358750:3(94-103)Online publication date: Mar-2012
  • (2010)A Survey of PCN-Based Admission Control and Flow TerminationIEEE Communications Surveys & Tutorials10.1109/SURV.2010.040710.0007812:3(357-375)Online publication date: 1-Jul-2010
  • (2010)Efficient traffic loss evaluation for transport backbone networksComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2010.01.00854:10(1683-1691)Online publication date: 1-Jul-2010
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media