Traffic Management for the Available Bit Rate (ABR) Service in ...
Traffic Management for the Available Bit Rate (ABR) Service in ... Traffic Management for the Available Bit Rate (ABR) Service in ...
The use of the utilization factor introduces higher degree of variation in load, and the possibility of sharp queue spikes. This necessitates complex variance reduction and queue control techniques within the algorithm, and introduces several extra parameters. The scheme may also require the sources to negotiate a lower value of the \Rate Increase Factor (RIF)" parameter to moderate the network-directed rate increases. The queue thresholding procedures may require a new set of parameter recom- mendations for Wide Area Networks. It is not clear whether the scheme will work in WANs without complex parameter changes. 4.9 UCSC Scheme This scheme was proposed by researchers Kalampoukas and Varma at the Univer- sity of California, Santa Cruz (UCSC), and K.K. Ramakrishnan of AT&T Research [58]. 4.9.1 Key Techniques The scheme cleverly approximates the MIT scheme with O(1) bookkeeping, and hence brings the computational complexity from O(N) to O(1). Intuitively, the scheme spreads the MIT O(N) iteration over successive RM cells. As a result, the convergence time and bu er requirements are traded o with computational com- plexity. The space requirements compared to the MIT scheme remain O(N) since the scheme maintains some per-VC state information. In special cases, optimization may be achieved by using shift operations instead of multiply/divide operations. 75
The key technique in the scheme is the following. On the lines of the MIT scheme, the scheme assumes that the source demands a certain rate, and the switch tries to satisfy that demand. In the scheme, VCi \requests" bandwidth equal to min(ERi�CCRi). We can consider this as the \demand" of VCi. The same quantity can also be considered as the bandwidth \usage" of the VC. The scheme computes a \maximum bandwidth" value Amax depending upon the VC's current state. Amax is the fairshare which is given to the source as feedback. Next, we describe the states of the VCs and show how they are used to compute the bandwidth allocations. Each VCi can be in one of the following two states: 1. Bottlenecked: the switch cannot allocate the requested bandwidth to VCi on the outgoing link, Amax < min(ERi�CCRi). The set of bottlenecked connec- tions is B. Intuitively, the bottlenecked connections are those that can use a higher rate allocation at the switch. 2. Satis ed: the switch can satisfy the request, Amax min(ERi�CCRi). The set of bottlenecked connections is S. Intuitively, the bottlenecked connections are those which cannot use even the current maximum bandwidth allocation Amax. In some sense, they are currently \saturated." Typically, a given VCi will be in di erent states (bottlenecked and satis ed) at di erent switches. Observe that connections can move from one state to another depending upon their demand and the available bandwidth. Free bandwidth is de- ned as the amount of bandwidth available as a result of the satis ed connections not claiming their equal share, Beq. The computation of the maximum bandwidth allocation for a connection is done as follows. 76
- Page 51 and 52: Figure 2.7: Scheduling of forward R
- Page 53 and 54: as the timeout value) which reduces
- Page 55 and 56: It has been incorrectly believed th
- Page 57 and 58: NI CI Action 0 0 ACR Min(ER, ACR +
- Page 59 and 60: Source Rule 13: Sources can optiona
- Page 61 and 62: Switch Rule 1: This rule speci es t
- Page 63 and 64: Observe that the ABR tra c manageme
- Page 65 and 66: complex method like per-VC queuing
- Page 67 and 68: graphs have a steady state with con
- Page 69 and 70: Figure 3.2: Operating point between
- Page 71 and 72: The following example illustrates t
- Page 73 and 74: mention this concept of fairness fo
- Page 75 and 76: control problem was also simpler. S
- Page 77 and 78: of such an occurrence is expected t
- Page 79 and 80: y giving only one feedback per meas
- Page 81 and 82: CHAPTER 4 SURVEY OF ATM SWITCH CONG
- Page 83 and 84: The adaptive FCVC algorithm [63] co
- Page 85 and 86: np. Thus, long path VCs have fewer
- Page 87 and 88: networks like ATM can have complete
- Page 89 and 90: scheme followed by a discussion of
- Page 91 and 92: exibility of decoupling the enforce
- Page 93 and 94: 4.6.1 Key Techniques In EPRCA, the
- Page 95 and 96: If the mean ACR is not a good estim
- Page 97 and 98: is the ratio of the input rate to t
- Page 99 and 100: which shares the link equally as al
- Page 101: proportional to the the unused ABR
- Page 105 and 106: the bandwidth allocations to satis
- Page 107 and 108: 4.10 DMRCA scheme The Dynamic Max R
- Page 109 and 110: on its CCR. Further MAX times out i
- Page 111 and 112: other words, a di erent set of para
- Page 113 and 114: A combination of several ideas in a
- Page 115 and 116: 4.13 SP-EPRCA scheme The SP-EPRCA s
- Page 117 and 118: RTD and shuts o the source (for sta
- Page 119 and 120: 4.14.1 Common Drawbacks Though the
- Page 121 and 122: The ATM Tra c Management standard a
- Page 123 and 124: 5.1.1 Control-Cell Format The contr
- Page 125 and 126: The last two elds are used in the b
- Page 127 and 128: Figure 5.3: Flow chart for updating
- Page 129 and 130: LAF in cell Max(LAF in cell, z) The
- Page 131 and 132: the time of departure (instant mark
- Page 133 and 134: the steady state. The system operat
- Page 135 and 136: 5.2.3 Use Measured Rather Than Decl
- Page 137 and 138: said about the maximum queue length
- Page 139 and 140: The key problem with some unipolar
- Page 141 and 142: Figure 5.6: Space time diagram show
- Page 143 and 144: As noted, these heuristics do not g
- Page 145 and 146: Transmitted Cell Rate ABR Queue Len
- Page 147 and 148: 4. The RM cell contains a timestamp
- Page 149 and 150: 1. The source o ered average cell r
- Page 151 and 152: Transmitted Cell Rate Link Utilizat
The key technique <strong>in</strong> <strong>the</strong> scheme is <strong>the</strong> follow<strong>in</strong>g. On <strong>the</strong> l<strong>in</strong>es of <strong>the</strong> MIT<br />
scheme, <strong>the</strong> scheme assumes that <strong>the</strong> source demands a certa<strong>in</strong> rate, and <strong>the</strong> switch<br />
tries to satisfy that demand. In <strong>the</strong> scheme, VCi \requests" bandwidth equal to<br />
m<strong>in</strong>(ERi�CCRi). We can consider this as <strong>the</strong> \demand" of VCi. The same quantity<br />
can also be considered as <strong>the</strong> bandwidth \usage" of <strong>the</strong> VC. The scheme computes a<br />
\maximum bandwidth" value Amax depend<strong>in</strong>g upon <strong>the</strong> VC's current state. Amax is<br />
<strong>the</strong> fairshare which is given to <strong>the</strong> source as feedback. Next, we describe <strong>the</strong> states<br />
of <strong>the</strong> VCs and show how <strong>the</strong>y are used to compute <strong>the</strong> bandwidth allocations.<br />
Each VCi can be <strong>in</strong> one of <strong>the</strong> follow<strong>in</strong>g two states:<br />
1. Bottlenecked: <strong>the</strong> switch cannot allocate <strong>the</strong> requested bandwidth to VCi on<br />
<strong>the</strong> outgo<strong>in</strong>g l<strong>in</strong>k, Amax < m<strong>in</strong>(ERi�CCRi). The set of bottlenecked connec-<br />
tions is B. Intuitively, <strong>the</strong> bottlenecked connections are those that can use a<br />
higher rate allocation at <strong>the</strong> switch.<br />
2. Satis ed: <strong>the</strong> switch can satisfy <strong>the</strong> request, Amax<br />
m<strong>in</strong>(ERi�CCRi). The<br />
set of bottlenecked connections is S. Intuitively, <strong>the</strong> bottlenecked connections<br />
are those which cannot use even <strong>the</strong> current maximum bandwidth allocation<br />
Amax. In some sense, <strong>the</strong>y are currently \saturated."<br />
Typically, a given VCi will be <strong>in</strong> di erent states (bottlenecked and satis ed) at<br />
di erent switches. Observe that connections can move from one state to ano<strong>the</strong>r<br />
depend<strong>in</strong>g upon <strong>the</strong>ir demand and <strong>the</strong> available bandwidth. Free bandwidth is de-<br />
ned as <strong>the</strong> amount of bandwidth available as a result of <strong>the</strong> satis ed connections<br />
not claim<strong>in</strong>g <strong>the</strong>ir equal share, Beq. The computation of <strong>the</strong> maximum bandwidth<br />
allocation <strong>for</strong> a connection is done as follows.<br />
76