The key role of traffic meter for quality of service admission control internet is to control the amount of traffic injected into the differentiated service network so that congestion can be avoided to the barest minimum in order to meet certain performance requirements. This paper presents performance evaluation and analysis of two traffic meters: token bucket marker (TBM) and two rate three color marker (srTCM) QoS admission control using user datagram protocol (UDP) and transport control protocol (TCP) traffic agents. The performance measures used for the evaluation and analysis were throughput, fairness and losses. An in-depth study of the aforementioned admission control mechanisms that can enforce service level agreement (SLA) was carried out in order to suggest to the IETF which of the proposed meter would best provide QoS to users. A network simulator, ns-2.35 to be precise, was used to run the simulation to showcase the analysis and evaluation of the traffic meters. For TCP traffic agent, the analysis based on fairness, throughput and losses showed that the two rate three color marker with percentages 13.15 for fairness, 98.85 for throughput and 0.14 for losses was better in all ramification than the token bucket marker traffic meter with percentages of 12.50 for fairness, 96.66 for throughput and 1.34 losses. For UDP traffic, reverse was the case. The token bucker marker traffic meter with 24.54% of fairness, 62.69% of throughput and 37.37% of losses was better than the two rate three color marker traffic meter with 13.99% of fairness, 21.10% of throughput and 78.99% of losses.
This paper presents a novel approach for implementing quality of service as demanded by evolving applications in the Internet. For some decades now, research efforts have led to the extension of the TCP/IP in order to make the Internet a full-fledged quality of service network. Novel in the extension is the invention of the Integrated services and Differentiated services architectures. The Differentiated services architecture was widely accepted among researchers because of its scalability. In order to achieve some of the refinements to the current TCP/IP protocol by the IETF for DiffServ implementation in the Internet, new traffic management mechanisms such as differential packet buffering cum differential allocation of available link bandwidth are needed. This report studied some suggested scheduling algorithms in literature on how to incorporate a multi-queue paradigm and enforce service level agreement in the Internet. A new scheduling model that ensures maximum utilization of network bandwidth is used to assess experimental implementation of Differentiated services in a QoS-based router. The model, termed, carry-on Weighted Round Robin (cWRR) proved better than the original Weighted Round Robin (WRR) scheme in terms of low higher throughput and fairness to traffic sources in a multi-queue network core router paradigm. General TermsDifferentiated Services, Quality of Services, and Weighed Round Robin KeywordsDiffServ, QoS Router, Scheduler, TCP/IP, WRR 1.INTRODUCTIONA Router is an indispensable network device that receives traffic streams coming from various sources or other routers and forwards them to the next intermediate router or destination router. A key function of this device operating under a multi-queue paradigm is the scheduling approach through which it decides which packets and from which queue to transmit next. According to [1], the next generation Internet router can implement up to 64 different queues, each queue keeps packets of a particular group of application that expects same treatment from the network. In order to grant certain required quality to a network application, service level agreements between the traffic sources and the network needs to be enforced at the routers. Accordingly, the source specifies a particular request (traffic spec) while the network determines the estimated the sending profile of the source.Any violation may lead to unexpected treatment of the extra traffics from the source. The authors in [2] places emphasis on the importance of a router scheduling algorithm to be a procedure that influences three orthogonal traffic management functions: buffering of packets, ordering of packets for transmission and controlling of congestion by dropping packets if need be. These key functions of a network router scheduling algorithm have led researchers to propose different algorithms for supporting many queues and satisfying various requirements of each traffic group in DiffServ. Most of the algorithms are criticized in terms of flow isolation, delays experienced by...
Traffic meter algorithms serve as a means of examining traffic stream’s conformance with service level agreement between customers (traffic sources) and Internet Service provider at the edge router of a differentiated service domain for proper quality of service admission control. This paper presented comparative analysis of variants of token bucket meter algorithms for QoS router using user datagram protocol (UDP) as traffic agents and exponential ON/OFF as traffic generator. The research adopted simulation technique to carry out the design of network models or topologies using the same parameter setting to implement the algorithm of token bucket variants of traffic meter. The following metrics were used for the evaluation: throughput, fairness rate, loss rate and one-way packet delay. The evaluated results were ranked and further subjected to 2-way analysis of variance (ANOVA) model to indicate the significant differences among the traffic meter algorithms. Based on ranking system, TRTCM was ranked first in terms of throughput (with 67117) and fairness rate (with 0.2586) and TBM was ranked first in terms of loss rate (with 74.003) and one-way packet delay (with 0.09304). The 2-way ANOVA model showed the significant differences among the traffic meter algorithms considered for the simulation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.