Abstract:Abstract-This paper proposes novel resource sharing schemes for differentiated services (DiffServ) networks, to achieve both high resource utilization and quality of service (QoS) guarantee. Service level agreements (SLAs) are negotiated at network boundaries and supported by path-oriented resource mapping within the network. The recently proposed SLA management scheme based on virtual partitioning (Bouillet et al., 2002) allows overloaded SLAs to exploit the spare capacity of underloaded SLAs for efficient re… Show more
“…Each SLA may apply different policy rules to determine the protection bandwidth and the associated spare capacity. For example, if the SLA is negotiated to guarantee the call blocking probability, the Erlang-B formula can then be used to calculated the protection bandwidth [10]. For a stable SLA management system, sufficient protection bandwidth should be reserved so that the QoS performance of an underloaded SLA is better than or at least as good as the target QoS specification; otherwise, malicious overloading would be encouraged.…”
Section: Sla Definition and Resource-sharing Policiesmentioning
confidence: 99%
“…In [9,10], we refer to the inter-SLA resource sharing as bandwidth borrowing; both inter-SLA sharing and bandwidth borrowing are used interchangeably in the following for convenience. When bandwidth borrowing happens, the related unlendable and lendable SLAs are termed as borrower SLAs and lender SLAs, respectively.…”
Section: Network Status Record For Resource Sharingmentioning
confidence: 99%
“…In any scenario, the network status and resource utilization information are mapped to a uniform set of information records as presented in the previous subsection, based on which the bandwidth borrowing scheme [9,10] can then be applied to implement the inter-SLA resource sharing.…”
Section: Bandwidth Borrowingmentioning
confidence: 99%
“…The CAC procedure and associated implementation of all the subroutines presented in [10] are an example of the general procedure given in Fig. 4, where the SLA is to guarantee the call blocking probability (CBP).…”
Section: Policy-based Routing/cacmentioning
confidence: 99%
“…The protection bandwidth is guaranteed for the underloaders to satisfy their QoS requirements during the underloaded periods, and the available spare capacity is then properly distributed to related links to be borrowed by others according to a call-level differentiation policy. The inter-SLA resource sharing concept was first proposed in our work [10] to guarantee the QoS requirement on call blocking probability for all the SLAs involved in the resource sharing. In this paper, we probe further to reveal the potentials of such a resource sharing approach for PBISRA, where the network manager can flexibly design or modify the policy rules that define underload and overload status, determine the bandwidth reservation, or distribute the spare resources among bandwidth borrowers, which are all supported by a common set of resource allocation techniques to enforce the SLA.…”
This paper proposes efficient resource allocation techniques for a policy-based wireless/wireline interworking architecture, where quality of service (QoS) provisioning and resource allocation is driven by the service level agreement (SLA). For end-to-end
“…Each SLA may apply different policy rules to determine the protection bandwidth and the associated spare capacity. For example, if the SLA is negotiated to guarantee the call blocking probability, the Erlang-B formula can then be used to calculated the protection bandwidth [10]. For a stable SLA management system, sufficient protection bandwidth should be reserved so that the QoS performance of an underloaded SLA is better than or at least as good as the target QoS specification; otherwise, malicious overloading would be encouraged.…”
Section: Sla Definition and Resource-sharing Policiesmentioning
confidence: 99%
“…In [9,10], we refer to the inter-SLA resource sharing as bandwidth borrowing; both inter-SLA sharing and bandwidth borrowing are used interchangeably in the following for convenience. When bandwidth borrowing happens, the related unlendable and lendable SLAs are termed as borrower SLAs and lender SLAs, respectively.…”
Section: Network Status Record For Resource Sharingmentioning
confidence: 99%
“…In any scenario, the network status and resource utilization information are mapped to a uniform set of information records as presented in the previous subsection, based on which the bandwidth borrowing scheme [9,10] can then be applied to implement the inter-SLA resource sharing.…”
Section: Bandwidth Borrowingmentioning
confidence: 99%
“…The CAC procedure and associated implementation of all the subroutines presented in [10] are an example of the general procedure given in Fig. 4, where the SLA is to guarantee the call blocking probability (CBP).…”
Section: Policy-based Routing/cacmentioning
confidence: 99%
“…The protection bandwidth is guaranteed for the underloaders to satisfy their QoS requirements during the underloaded periods, and the available spare capacity is then properly distributed to related links to be borrowed by others according to a call-level differentiation policy. The inter-SLA resource sharing concept was first proposed in our work [10] to guarantee the QoS requirement on call blocking probability for all the SLAs involved in the resource sharing. In this paper, we probe further to reveal the potentials of such a resource sharing approach for PBISRA, where the network manager can flexibly design or modify the policy rules that define underload and overload status, determine the bandwidth reservation, or distribute the spare resources among bandwidth borrowers, which are all supported by a common set of resource allocation techniques to enforce the SLA.…”
This paper proposes efficient resource allocation techniques for a policy-based wireless/wireline interworking architecture, where quality of service (QoS) provisioning and resource allocation is driven by the service level agreement (SLA). For end-to-end
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.