2002
DOI: 10.1007/3-540-47906-6_36
|View full text |Cite
|
Sign up to set email alerts
|

Resource Allocation with Persistent and Transient Flows

Abstract: Abstract. The flow control algorithms currently used in the Internet have been tailored to share bandwidth between users on the basis of the physical characteristics of the network links they use rather than the characteristics of their applications. This can result in a perception of poor quality of service by some users even when adequate bandwidth is potentially available, and is the motivation for seeking to provide differentiated services. In this paper, stimulated by current discussion on Web mice and el… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2004
2004
2007
2007

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…For , we have (18) In Fig. 1, we plot the mean utility of a persistent flow and the mean number of transient flows in the system for (i) the static policy, as given by (17), (ii) weighted PS, as given by (18), (iii) naive PS, which gives an equal share of bandwidth to each flow, persistent or transient, and (iv) the optimal policy, obtained numerically using the techniques described in [6], [7]. If all flows use TCP, then case (iii) approximates the bandwidth shares they obtain.…”
Section: Numerical Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…For , we have (18) In Fig. 1, we plot the mean utility of a persistent flow and the mean number of transient flows in the system for (i) the static policy, as given by (17), (ii) weighted PS, as given by (18), (iii) naive PS, which gives an equal share of bandwidth to each flow, persistent or transient, and (iv) the optimal policy, obtained numerically using the techniques described in [6], [7]. If all flows use TCP, then case (iii) approximates the bandwidth shares they obtain.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…Now, if the work backlogged at time is no smaller than , and if no flow contributes more than , then the number of backlogged flows must be at least . Thus, it is immediate from (4) and (5) that, given any and , it holds for all sufficiently large that (6) Therefore, by the Borel-Cantelli lemma, infinitely often, i.e., . Since this holds for arbitrarily large , the first claim of the claim is established.…”
Section: Bounds On the Optimal Value Functionmentioning
confidence: 92%
See 1 more Smart Citation
“…Interestingly this policy has the same structure as the solution of a different optimization problem considered in [25] (see also Section 1.2), while a packet-level implementation is documented in [27]. The thesis considers a macroscopic implementation of this policy, where the targeted congestion-threshold is assumed to be identical with a targeted throughput per flow.…”
Section: Congestion-based Threshold (Cbt)mentioning
confidence: 99%
“…Closer to the methodology followed in this thesis is the work in [25]. The main difference is that the designer may control all the types of flows in the traffic mixture (background, persistent and short TCPs) and thus their numbers are considered to be known, a clearly unrealistic assumption for public environments.…”
Section: Related Workmentioning
confidence: 99%