Our focus in this work is on the fundamental relationship between network resources and the QoS that the network can support. A widely used folk theorem is that multiplexing increases efficiency, and that the magnitude of the efficiency gain depends on the burstiness of the traffic, but often these relationships are often difficult to analytically characterize.
The first paper addresses the gains obtained by multiplexing bursty traffic operating under QoS contraints. The results establish a basis for the belief that although bursty sources require more bandwidth, multiplexing gains are increasing with burstiness. When heterogeneous sources are partially multiplexed, it also demonstrates that it is most efficient to group similar source types.
The second paper addresses a simple question: how do the optimal allocations of bandwidth and buffer vary with the number of sources? For on/off fluid flows, the optimal buffer allocation is proven to be proportional to the square root of the number of sources, and hence that allocation of a fixed buffer, or allocation of buffer linearly with the number of sources, can lead to substantial inefficiency.
The third set of papers address the relationship between the network capacity and the number of data users that can be supported under a QoS criterion. Two types of QoS are considered: the average rate achieved and the probability that the rate is above a specified threshold. These results can be used to establish the cost associated with a QoS contraint on the basis of the network resources required.
Portions of this work were supported by DARPA and NSF. Any opinions, findings, conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation, DARPA, or IEEE. This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. One print or electronic copy may be made for personal use only. Permission must be obtained from the copyright holder for systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplication of any material in these papers for a fee or for commercial purposes, modification of the content of these papers, reprinting or republishing of this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, and to reuse any copyrighted component of this work in other works.
|UCI CS Networked Systems