Quality Estimation of Bandwidth in a Network

Article Preview

Abstract:

The available bandwidth (avail-bw) in a network path is of major importance in congestion control, streaming applications, quality-of-service verification, server selection, and overlay networks. In a packet network, the terms bandwidth and throughput often characterize the amount of data that the network can transfer per unit of time. Bandwidth estimation are also important for traffic engineering and capacity planning support. We propose a QoS-aware routing protocol that incorporates an admission control scheme and a feedback scheme to meet the QoS requirements of real-time applications. Results of our experiments show that the packet delivery ratio increases, and packet delay and energy dissipation decrease significantly, while the overall end-to-end throughput is not impacted, compared with routing protocols that do no provide QoS support. Nevertheless, the load is better balanced in the network, therefore the network capacity is not overloaded. The result in more stable routes and less control traffic as almost no reconstructions are needed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

467-471

Citation:

Online since:

February 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Khoshgoftaar, T. M., Zhong, S., & Joshi.V. Noise elimination with ensemble-classifier filtering for software quality estimation. Intelligent Data Analysis: An International Journal, 9(1), 3-27. Ayyagari, O. Brewer, T. Griem, J. Kim, "Diffserv . (2005).

DOI: 10.3233/ida-2005-9102

Google Scholar

[2] Pizzi, N. J., Summers, R., & Pedrycz, W Extensions to Dynamic Link States and Bandwidths for QoS-Aware Mobile Networking Applications, "MILCOM 2005, October 2005. (2002).

DOI: 10.1109/milcom.2005.1605941

Google Scholar

[3] Honolulu, Hi, Software quality prediction using median-adjusted class labels. In Proceedings of international joint conference on neural networks May 2002, Vol. 3, pp.2405-2409, IEEE Computer Society.

DOI: 10.1109/ijcnn.2002.1007518

Google Scholar

[4] Y. Zhang and M. Ahmed, Gateway to Gateway Protocol, HRL Final Project Report, Mobile Networking NCO Task, (2005).

Google Scholar

[5] John E. Hershey Cryptography Demystified John E. Hershey, TATA Mc Graw Hill (2004).

Google Scholar

[6] Johennie Helton Mastering Java Rich Helton Wiley 2002 security Dreamtech.

Google Scholar

[7] Patrick Naughton Herbert Schidlt The complete Reference Java2 TATA McGraw Hill (1994).

Google Scholar

[8] Johennie Helton Mastering Java security Rich Helton Dreamtech Jaworicsk Techmedia (1998).

Google Scholar