Adaptive bandwidth provisioning with explicit respect to QoS requirements
Transcript of Adaptive bandwidth provisioning with explicit respect to QoS requirements
Adaptive bandwidth provisioning with explicit
respect to QoS requirements*
Hung Tuan Tran*, Thomas Ziegler
Telecommunications Research Center Vienna (ftw.), Donaucity Strasse 1, 1220 Vienna, Austria
Received 28 October 2003; revised 17 December 2004; accepted 20 December 2004
Available online 7 January 2005
Abstract
We propose adaptive bandwidth provisioning schemes enabling quality of service (QoS) guarantees. To this end, we exploit periodic
measurements and traffic predictions to capture closely traffic dynamics. We make use of the Gaussian traffic model providing bounds for
QoS to derive the associated bandwidth demands. Moreover, special attention is paid to alleviating some typical problems with adaptive
provisioning like QoS degradations and signaling overhead. Analytical and simulative investigations using real traffic traces show that the
proposed schemes outperform previous ones.
q 2005 Elsevier B.V. All rights reserved.
Keywords: Bandwidth provisioning; Statistical QoS; Gaussian process
1. Introduction
QoS-aware bandwidth provisioning is certainly an
important issue regarding the profitable operation of service
providers. Network operators would like to attract custo-
mers by committing to QoS delivery, but at the same time
they prefer reasonable bandwidth provisioning, rather than a
too plentiful over-provisioning. Toward this two-fold aim,
QoS-aware adaptive bandwidth provisioning schemes
emerge as a promising solution having a wide range of
applicability. Plausible examples are QoS-aware bandwidth
allocation for traffic classes in the DiffServ architecture,
QoS-aware resizing of tunnels (e.g. MPLS tunnels, tunnels
in Virtual Private Networks, logical links in the Service
Overlay Networks [1] for providing end-to-end QoS over
inter domains), and QoS-aware capacity design for IP links.
Most of the work on bandwidth provisioning so far
simply use the link utilization as a basic factor for
0140-3664/$ - see front matter q 2005 Elsevier B.V. All rights reserved.
doi:10.1016/j.comcom.2004.12.020
* An earlier, abridged version of this paper appeared in the proceedings of
the 4th COST 263 International Workshop on Quality of Future Internet
Services, QoFIS’03.
* Corresponding author. Tel.: C43 1 505 28 30/50; fax: C43 1 505 28
30/99.
E-mail addresses: [email protected] (H.T. Tran), [email protected] (T. Ziegler).
provisioning. It means that a certain target link utilization
threshold (e.g. 50 or 70%, solely based on practical
experiments) is adopted, and bandwidth is added to or
released from the link based on the relation between the
current link utilization and the target threshold. In fact, this
kind of provisioning solution is widely used in practice by
backbone service providers [2], by VPN operators [3], and
by overlay network providers [1].
The drawback of the link utilization based provisioning
solution above is that the role of the adopted utilization level
on QoS achievements is not explicitly specified. In other
words, if we are given a QoS requirement, saying, e.g. that
only 1% of packets is allowed to encounter a delay
exceeding 10 ms, we do not know how to choose the right
value of the corresponding link utilization for provisioning
purpose.
The above observation gives us a motivation to elaborate
novel provisioning schemes with explicit respect to
statistical QoS requirements. Our main contribution in this
paper is the specification of how to adjust adaptively the
bandwidth of a given link to meet the given requirements on
objective QoS parameters, like packet loss and packet delay
probabilities. We develop novel adaptive provisioning
schemes whose features are based on traffic measurements,
the Gaussian traffic model, and appropriate traffic
Computer Communications 28 (2005) 1862–1876
www.elsevier.com/locate/comcom
H.T. Tran, T. Ziegler / Computer Communications 28 (2005) 1862–1876 1863
predictors. By testing the proposed schemes with real traffic
traces, and applying a well-defined analytical assessment
methodology, we show that they exhibit superiority over
some existing schemes, and indeed serve as promising
candidates for resource management tasks.
The paper is organised as follows. In Section 2, we
explain the specific details of our provisioning task and
propose two new provisioning schemes referred to as PS1
and PS2. Afterwards, in Section 3 we assess the perform-
ance of these two schemes. We work out the methodology
for the quantitative assessment and based on that, achieve
the performance evaluation in comparison with existing
provisioning alternatives using real traffic traces. The
detailed analysis of the obtained results in this section
triggers further enhancements of the proposed schemes.
Thus, in Section 4 we develop additional rules supporting
signalling overhead reduction. Also, we develop new traffic
prediction rules to avoid under-estimation of traffic, leading
to two new provisioning schemes referred to as PS1* and
PS1**. We demonstrate by trace driven simulation and by
theoretical arguments (the strict proof is found in Appendix
A) that these enhanced schemes indeed achieve much better
results than the existing schemes. In Section 5, we envision
some typical application areas of the proposed provisioning
schemes. In Section 6, we provide a brief overview on
related work, pointing out the added value of our schemes.
Finally, Section 7 concludes the paper.
2. Development of QoS-aware, adaptive provisioning
schemes
Our main provisioning task is to determine the
bandwidth allocated to the link satisfying the target QoS,
which is the packet level constraint
PrðdelayODÞ!e: (1)
Here, D and e are the given delay bound (excluding the
propagation delay) and the upper-bound for the violation
probability, respectively. Moreover, for economical band-
width usage, the bandwidth allocation should be done with
respect to the dynamics of the traffic the link accommo-
dates. In other words, we aim to achieve dynamic
provisioning, where the needed bandwidth amount is
adaptively adjusted from time to time, taking into account
the dynamics of the accommodated traffic. The total delay
is composed of queueing delay and transmission delay.
However, when the packet size is considerably small
compared to the link capacity c (which is particularly true
for high speed links), the transmission delay negligibly
contributes to the total delay. Thus, we can consider the
delay constraint (1) equivalent with the constraint on the
queue tail probability
PrðQODcÞ!e; (2)
where Q stands for the queue length, and c is the
bandwidth to be allocated.
In Section 2.1, we first briefly describe an estimation of
the queue tail probability (2), and then we present our two
preliminary provisioning schemes based on this estimation.
2.1. Estimation of the queue tail probability
using the Gaussian traffic model
For high speed links accommodating a huge number of
traffic flows, QoS-aware provisioning rules based on the
exact traffic description derived from exact characteristics
of individual flows collapse in a sense of practical
applicability. It is due to the exploration of state space
one could face. Therefore, an assimilated and tractable
model for the aggregate traffic should be preferred. From
this point of view, the Gaussian process has recently been
considered as a good candidate because it captures well
characteristics (multiplexing effects, correlation structure)
of the aggregate traffic while still being easily controllable
[4–6].
Specifically, [5] proposes the so called MVA (Maximum
Variance Asymptotic) bound for the tail probability of the
buffer fed by an input Gaussian process. Moreover, it is
shown therein that this asymptotic bound practically
behaves like a tight global upperbound for the queue tail
probability. Ref. [6] utilizes the MVA bound along with the
exact loss probability of a bufferless system to give an
estimation on the loss probability of a given system with a
finite buffer. Both papers present an analysis based on a
discrete time, fluid-flow queue which we briefly summarize
below.
Given a queue with the aggregate input rate ln and
service rate c at time n, define a stochastic process Xn as
Xn ZXn
kZ1
lk Kcn: (3)
For a buffer size x, define the normalized variance s2x;n of
Xn as
s2x;n :Z
VarfXng
ðx KEfXngÞ2; (4)
and let sx be the reciprocal of the maximum of s2x;n, i.e.
sx :Z1
maxnR1s2x;n
: (5)
We note that if the aggregate input rate ln is a Gaussian
process, so is Xn. Using the Gaussian property of Xn and the
so called dominant time scale approach [5], the MVA
bound, i.e. the bound on the queue tail probability P(QOx),
is given as eKsx=2. We will formally write
MVA_boundðEfXng;VarfXng; xÞ Z eKsx=2: (6)
The loss estimation (i.e. the loss probability PL(x) for
buffer size x) is given as g eKsx=2 [6]. Here, the term g is
Fig. 1. A binary search to compute the needed bandwidth amount.
H.T. Tran, T. Ziegler / Computer Communications 28 (2005) 1862–18761864
calculated as
g Z1ffiffiffiffiffiffiffiffiffi
2psp eðcK�lÞ2=2s2
ðN
cðr KcÞeðrK
�lÞ2=2s2
dr;
where �lZEflng, s2ZVarflngZClð0Þ and Cl(l) is the
autocovariance function of ln.
For the given value of n, nR1, the mean and variance of
Xn can be computed from the mean and the autocovariance
functions of the input rate as
EfXng Z nð �l KcÞ (7)
VarfXng Z nClð0ÞC2XnK1
lZ1
ðn K lÞClðlÞ: (8)
The presented MVA and loss bounds can be used to make
the mapping between the bandwidth to provision and QoS
requirements explicit. In the remainder of this paper we will
present MVA bound based (or equivalently, delay-based)
provisioning schemes. However, the same concept is
straightforwardly applicable to the loss or loss-delay
combination based provisioning as well.
2.2. Provisioning schemes combining use of the Gaussian
model, periodical measurements, and traffic predictions
The incipient point of our provisioning schemes is to
collect periodically the aggregate rate of the incoming traffic
in consecutive time slots with length t. Denote the traffic
rate measured in slot i by yi. Bandwidth provisioning is
performed at a larger time scale expressed in resizing
windows (or shortly, windows). One resizing window
consists of N measurement time slots. We compute the
mean and autocovariance functions of traffic over a given
window j as mjZPN
iZ1yðjÞi
N, and
CjðkÞ Z1
N Kk
XNKk
iZ1
ðyðjÞi KmjÞðy
ðjÞiCk KmjÞ
for k Z 0; 1;.;N K1:
The computed quantities enable us to capture the mean
and variance of the accumulated traffic process Xn by using
Eqs. (7) and (8) and in turn the MVA and loss bounds. At the
end of each resizing window we make a decision about the
bandwidth amount needed for the next resizing window. We
specify two schemes for this task.
PS1 scheme, delay-based, with prediction. In this
scheme, we propose to perform traffic prediction at the
end of each resizing window for the next one. We predict
both the mean rate of the aggregate traffic and the variance
of the cumulative process Xn. We opt for the exponential
smoothing (ES) technique for the prediction due to its
proven stability and suitability on trend prediction [7].
Formally, for the resizing window jC1 we predict
m�jC1 Z wmj C ð1 KwÞm�
j ; (9)
where w is the weighting parameter (0%w%1), m�j and mj
are the predicted and measured values of the mean rate for
the resizing window j, respectively. Similarly, for the
variance of the accumulated traffic, we predict
Var�fXn;jC1g Z w VarfXn;jgC ð1 KwÞVar�fXn;jg (10)
where Var*{Xn,j} and Var{Xn,j} (nZ0,1,.,NK1) are the
predicted and measured values of the corresponding
accumulated variance for the resizing window j, respect-
ively. We then use the predicted m�jC1 and Var*{Xn,jC1}
values as the inputs for the binary search presented in Fig. 1 to
define the needed bandwidth for the window jC1. In Fig. 1,
the MVA bound computation is symbolically denoted by the
function MVA_bound( ), as introduced earlier in (6). The
output of the binary search is the bandwidth amount assuring
that the achievable QoS is sufficiently close (expressed via
the parameter e*) to the target QoS requirements.
PS2 scheme: delay-based, without prediction. In this
scheme, we simply use the computed mj and Var{Xn,j} (nZ0,1.,NK1) as the input parameters of the binary search for
the needed bandwidth of the window jC1.
3. Performance evaluation of the new provisioning
schemes
In this section, we evaluate the operation of the proposed
provisioning schemes PS1 and PS2. Before going into the
detailed investigations, we delineate the testing scenarios in
use and our assessment methodology in Section 3.1.
3.1. Scenario settings and methodology for evaluations
In order to have a comparative baseline, we involve two
other existing provisioning schemes available from previous
work. We referred to them as PS3 and PS4 schemes.
H.T. Tran, T. Ziegler / Computer Communications 28 (2005) 1862–1876 1865
PS3 scheme: utilization-based, without prediction. In this
scheme, link bandwidth regulation is based on the relation
between the link utilization threshold and the measured link
utilization in the last resizing window. According to the
proposal of Duan et al. [1], the bandwidth amount to be added
or released is measured in quota. One quota can be set to e.g.
bffiffiffiv
p, where v is the variance of the measured traffic rate. In
accordance with [1], we set the target link utilization to 0.8
and bZ0.6.
PS4 scheme: variance-based, without prediction. In this
scheme, the provisioned bandwidth for the next resizing
window is chosen to be mjCaffiffiffiffivj
p, where mj and vj are the
mean and variance in the current window j. The reason
behind this bandwidth setting and the concrete value of a is
that the scheme ensures that the aggregate traffic rate will
only exceed the chosen bandwidth with a probability
QðaÞZ ð1=2Þerfcða=ffiffiffi2
pÞ, where erfcðxÞZ ð2=
ffiffiffiffip
pÞÐN
x eKz2
dz.
This is the scheme by Duffield et al. [3]. In accordance with
[3], we set aZ3 (corresponding to the exceeding probability
Q(a)Z1.349!10K3).
We use three real traffic traces1 to produce the aggregate
load offered to the link. The MPEG trace is the trace of a
James Bond movie available from [8]. The BC-pAug89 trace
of Ethernet traffic is available from [9]. The WAN trace is a
wide-area TCP traffic trace dec-pkt-1 available also from
[9]. To generate the aggregate traffic with high multiplexing
degree, we merge 100 individual sources having the above
recorded traffic pattern. The starting time of each individual
source is randomly chosen to assure independency between
the sources.
We examine two scenarios of provisioning as regards the
scale of basic measurement time slots and resizing windows.
Namely, we consider resizing at small time scale, when each
resizing window contains 100 measurement time slots of
length 40 ms, i.e. resizing is done after each 4 s interval. In
this case, the provisioning is tested along 100 resizing
windows, meaning that the whole period of provisioning is
400 s. With resizing at large time scale, each time slot is
1200 ms, and resizing is done after each 100 slots, i.e. after
each 2 min. In this case, we test the provisioning schemes
along 13 resizing windows, meaning that the whole period of
provisioning is approximately half an hour.
We evaluate the performance of the schemes along two
parallel analysis aspects. In the simulative analysis, we
resort to trace-driven simulation to verify and evaluate the
performability of the provisioning schemes. The basic
scenario is that traffic according to the generated aggregate
trace is accommodated via a single link. The link capacity is
adjusted after each resizing window time and a value
computed off-line with the specific provisioning scheme
is assigned. We trace both the instantaneous queue length
at the queue (placed at the near-end of the link)
1 We process the original data traces so that the load over consecutive
time intervals with fixed length, i.e. the measurement slots, can be obtained.
and the queueing delay of individual packets. This data
collection enables us to compute the delay violation
probability for any given delay bound. Simulation results
will be reported later in Section 4.3.
For the analytical analysis, in order to evaluate
quantitatively the applied provisioning schemes, we intro-
duce the notion of Average Goodness Factor (AGF). This is
a measure of how fast and closely the provisioned
bandwidth follows the real traffic dynamics, while assuring
the target QoS. The basic idea is that in an ideal
provisioning case, the link utilization should be kept
constant at a fixed optimal level uopt. The concrete value
of uopt is chosen from the experiments gained by using the
Gaussian traffic model to deduce the relation between the
objective QoS parameters and the link utilization. For a
given resizing window j, let us denote the provisioned link
capacity by lj, the real aggregate traffic rate by rj. We then
define the Goodness Factor (GF) as follows:
GFj :Z
ðlj KrjÞ=rj
uopt
if lj%rj
rj=lj
uopt
if ljOrj and rj=lj%uopt
uopt
rj=ljif ljOrj and rj=ljOuopt
8>>>>>><>>>>>>:
(11)
This definition of the GF is motivated by the following
interpretations. Consider the severe under-provisioning
case when the provisioned link bandwidth is smaller than
the real traffic rate. The provision is then considered
‘wrong’, or equivalently it has a negative GF. The closer to
the real traffic rate the link capacity is, the ‘less wrong’ the
provision (i.e. its GF still remains negative but has a smaller
absolute value). On the other hand, for a given lj and rj
(lj%rj) the larger the optimal link utilization uopt, the larger
the GF value should be (because the under-provisioning has
less detrimental effect). These arguments are reflected on
the formulae ððlj KrjÞ=rjÞ=uopt. One can check that for two
different bandwidth values lð1Þj and lð2Þj , if lð1Þj O lð2Þj , then
ððlð1Þj KrjÞ=rjÞ=uopt O ððlð2Þj KrjÞ=rjÞ=uopt. Similarly, for two
different utilizations uopt1and uopt2
, if uopt1Ouopt2
, then
ððljKrjÞ=rjÞ=uopt1O ððljKrjÞ=rjÞ=uopt2
.
Now, consider the over-provisioning case when the
provisioned link capacity is larger than the real traffic rate,
and the utilization is below the optimal one, i.e. ljOrj and
rj/lj%uopt. This means that the link is somewhat over-
provisioned and decreasing the link capacity should result in
a better provisioning scheme. In other words, in this case the
GF should increase with the decrease of the provisioned link
capacity, which is reflected in the expression ðrj=ljÞ=uopt.
Similar arguments lead to the expression GFZuopt=ðrj=ljÞ
when the provisioned link capacity is larger than the real
traffic rate, but the actual link utilization is above the
optimal one, i.e. ljOrj and rj/ljOuopt.
Note that the GF value is either negative (the first case) or
positive but smaller than 1 (the latter two cases). The AGF is
Table 1
AGF values obtained with different prediction weights w
Small time scale Large time scale
w/Traffic MPEG WAN Ethernet MPEG WAN Ethernet
0.1 0.779 0.642 0.784 0.510 0.036 0.776
0.5 0.848 0.805 0.890 0.743 0.496 0.704
0.8 0.880 0.898 0.913 0.704 0.721 0.840
0.9 0.901 0.920 0.916 0.717 0.794 0.852
0.95 0.911 0.922 0.915 0.728 0.797 0.844
1 0.915 0.913 0.914 0.648 0.790 0.836
H.T. Tran, T. Ziegler / Computer Communications 28 (2005) 1862–18761866
then obtained by averaging all individual GF values over the
resizing windows, AGFZPM
1 GFj=M, where M is the
number of resizing windows. The higher the degree of over-
provisioning or under-provisioning, the smaller the AGF
value. The minimum AGF value is K1/uopt, the maximum
AGF value is 1. Moreover, the closer the AGF to 1, the
better the provisioning scheme.
Regarding the choice of the weighting parameter w used
in Eqs. (9) and (10), we have calculated the AGF values we
can obtain with the PS1 scheme for a set of w values. The
results are reported in Table 1. As the numerical values in
Table 1 indicate, for the three specific traffic aggregates,
there is a value of w between 0.8 and 1 (note that setting
wZ1 is nothing but to switch from PS1 to PS2 scheme)
yielding the maximum AGF. Nevertheless, the table also
shows that this maximum AGF value is not significantly
bigger than other AGF values obtained with other choices of
w. We have also tried with adaptive setting of w, e.g. to
adjust it accordingly to the dynamics of the relative or
absolute bias between the current traffic load value and the
predicted load value. However, our several adaptive setting
attempts do not yield noticeable improvements of PS1, at
least for the traffic patterns WAN, MPEG and Ethernet we
use. For this reason, in the rest of the paper, if not stated
otherwise, we set wZ0.8, keeping in mind that there might
be a smart adaptive setting of w further improving the
goodness of our provisioning schemes.
In addition, if not stated otherwise, we set the initial
value of the link bandwidth to 150 Mbps. The input
parameters for the binary search in Fig. 1 are:
†
the delay bound DZ10 ms,†
the desired delay violation probability eZ10K4,†
2 We skip the figures about Ethernet and WAN traffic traces, because they
allow the same conclusions.
e*Z0.1, allowing a range of (10K0.1, 100.1) for the QoS
bias, i.e. the QoS is considered acceptable when the
actual delay violation probability is in the range of
(0.79e, 1.25e).
3.2. Investigations on the performance
of PS1 and PS2 scheme
Figs. 2 and 3 present the small time scale provisioning
for MPEG traffic. Fig. 2 depicts the measured aggregate
rate (mj), the predicted aggregate rate (m�j ), the
bandwidth provisioned by the PS1 and PS2 schemes
vs. the resizing windows. Fig. 3 depicts the measured
aggregate rate (mj), the predicted aggregate rate (m�j ),
and the bandwidth provisioned by the PS3 and PS4
schemes. Figs. 4 and 5 are the counterpart of Figs. 2 and
3, which present the large time scale provisioning for
MPEG traffic.2
Considering the figures, we see that the PS1, PS2, and
PS4 schemes capture very well the shape of the aggregate
traffic. The three schemes react fast and closely to
variations of the aggregate rate. PS1 and PS2 schemes
exhibit nearly the same behaviour, and in fact their curves
are hardly distinguishable (see Figs. 2 and 4). The PS3
scheme does not follow well all the traffic fluctuations, but
rather has a smooth shape with linear increase or decrease.
This is in accordance with the original intention of this
approach, i.e. adjusting bandwidth insensitively to small
short-time traffic fluctuation [1]. Since PS3 reacts slowly to
the changes of the traffic, one of the consequences from
this property is that it is very sensitive to the initial
provisioned bandwidth value. Thus, it needs a long time to
reach an acceptable state where over-provisioning or
under-provisioning becomes less aggravating (see, e.g.
Fig. 3, windows 1–35).
At a larger time scale when provisioning actions are
taken at every 2 min, we see that the PS3 scheme works
unacceptably (Fig. 5). It is due to the inadequate setting of
the quota volume through the parameter b. In fact, the AGF
assessment in Table 2 confirms that with bZ0.6, the PS3
scheme exhibits the poorest performance in comparison to
PS1, PS2 and PS4 schemes. The table also shows that the
PS4 scheme, though it still captures well the tendency of
the traffic rate, is outperformed by the PS1 and PS2
schemes. The cause of such poor performance of PS3 and
PS4 relies behind the concrete choice of their parameter a
(which is currently set to 3) and b. Intuitively, appro-
priately tuning parameters a and b probably leads to better
performance of PS4 and PS3, respectively. However, if we
do not have a reasonable mapping between the QoS
requirements and the needed link utilization then there is
no way to choose the right values of a and b. Thus, PS1
and PS2 schemes with their model-based mapping features
are definitely more suitable in case explicit QoS is
required.
In Table 2, we report the AGF values of the provisioning
schemes for different traffic scenarios. The value of uopt is
set to be the average value of the utilizations achievable
over all the resizing windows with the Gaussian traffic
model to meet the target QoS requirement. To make the
comparative evaluation more complete, we also include the
AGF of the static provisioning schemes, where bandwidth is
kept constant over the whole time. In the ‘bad’ scheme
Static-1, the bandwidth is fixed at 150 Mbps. In scheme
Fig. 2. Small time scale bandwidth provision for MPEG traffic, PS1 and PS2 schemes.
Fig. 3. Small time scale bandwidth provision for MPEG traffic, PS3 and PS4 schemes.
H.T. Tran, T. Ziegler / Computer Communications 28 (2005) 1862–1876 1867
Static-2, with the rough knowledge on the aggregate rate of
traces, the bandwidth is fixed at 70, 250 and 200 Mbps for
MPEG, WAN and Ethernet traffic, respectively. Table 2
shows that the static schemes are in general outperformed
by the rest of the schemes. Moreover, the qualitative relation
between the AGF values of the schemes confirms all our
previous arguments. The PS3 scheme works unacceptably at
large time scale provisioning. PS1 and PS2 schemes have
nearly the same goodness and they are the best among the
tested schemes.
Beside the conclusion that the QoS-aware PS1 and PS2
schemes are better than the existing ones (including PS3,
PS4, and the static ones), it is to mention that there are still
questionable issues with PS1 and PS2. These issues are
concerned with signaling overhead and under-provisioning,
which are dealt in Section 4.
4. Further enhancing our provisioning schemes
4.1. Signalling reduction
From a practical point of view, the merit of any dynamic
provisioning scheme is judged by the tradeoff between
adjustment frequency and signalling overhead. On the one
hand, the higher the provisioning frequency, the better and
more accurate the resource allocation reflects the real traffic
dynamics. On the other hand, however, more adjustments
may require more signalling overheads (negotiations on
bandwidth amount, allocation and/or release of bandwidth),
which can have detrimental impacts on network
performance.
From the macroscopic point of view, the simplest way
to reduce signalling overhead is to skip non-critical
Fig. 5. Large time scale bandwidth provision for MPEG traffic, PS3 and PS4 schemes.
Fig. 4. Large time scale bandwidth provision for MPEG traffic, PS1 and PS2 schemes.
H.T. Tran, T. Ziegler / Computer Communications 28 (2005) 1862–18761868
bandwidth adjustments. Therefore, we propose the follow-
ing potential solutions for scalability improvements. For
skipping downward adjustments, we consider that over-
provisioning is always less detrimental than under
provisioning. Thus, if the relative bandwidth bias remains
below a certain value (e.g. 5% of the current bandwidth
value), we could keep the current bandwidth amount and
do not perform deallocation. By doing this, a certain range
of over-provisioning is implicitly involved at the gain of
signalling effort.
For skipping upward adjustments, we introduce a certain
number of bandwidth levels. We refer to the difference
between two consecutive bandwidth levels as a bandwidth
interval. If both the current and the new bandwidth values
stay within the same bandwidth interval, we do not initiate
the upgrade process. This is based on the compromise that
within one bandwidth interval, we can tolerate a certain
degree of QoS degradation. The procedure checking the
impact of bandwidth interval’s size on QoS degradations is
done as follows. We compute first the needed bandwidth for
the next resizing window taking the required delay violation
probability into account. Afterward, we reduce the com-
puted bandwidth by the amount identical to one bandwidth
interval size and then recompute the delay violation
probability we should get. We use the ratio between the
recomputed violation probability and the original violation
probability as an QoS degradation index, which is depicted
in Figs. 6 and 7. We see that the bandwidth interval should
be chosen smaller than 1% of the mean aggregate rate to
ensure that the QoS degradation index is below 4–5. Note
that the small value of the desired delay violation
probability (in a range of 10K4 or even smaller) makes
Table 2
AGF values of different provisioning schemes
Small time scale Large time scale
Scheme/traffic MPEG, uoptZ0.772 WAN, uoptZ0.890 Ethernet, uoptZ0.804 MPEG, uoptZ0.788 WAN, uoptZ0.781 Ethernet, uoptZ0.737
Static-1 0.368 0.123 0.422 0.403 K0.095 0.793
Static-2 0.778 0.721 0.751 0.734 0.722 0.683
PS1 0.880 0.898 0.913 0.704 0.721 0.840
PS2 0.916 0.914 0.914 0.683 0.803 0.848
PS3 0.750 0.830 0.841 0.443 K0.133 0.794
PS4 0.889 0.908 0.912 0.556 0.503 0.676
H.T. Tran, T. Ziegler / Computer Communications 28 (2005) 1862–1876 1869
the QoS degradation index in a range of 1–4 considered
acceptable.
In Table 3, we present the needed adjustment number of
the considered provisioning schemes. The relative band-
width bias (applied for skipping downward changes) is
varied from 1 to 5%, the bandwidth interval (applied for
skipping upward changes) is chosen to be 2 Mbps for
Ethernet and WAN traffic trace, 0.4 Mbps for the MPEG
trace. Recall that if the signalling reduction rules are not
involved, then we would have to perform 100 bandwidth
adjustments. As can be seen in the table, the implication of
the proposed skipping rules indeed yields noticeable
signaling gains, which can be up to a range of 20–30%.
4.2. Under-estimation avoidance
Another problem with the PS1 scheme is the negative
effect of under provisioning. An observation can be made
when considering Fig. 2 from time to time, and Fig. 4, in
windows 3–7. Although use of the ES technique for
prediction enables a quite close track on the trend of the
actual traffic, there is a certain lag between the real traffic
rate and the predicted rate. This in turn induces the fact that
the predicted rate underestimates the real one in certain
cases.
Looking again at the expression of the MVA bound eKsx=2
and the derivation of sx in expressions (4) and (5), we can
see that given a constant delay requirement (or equivalently
for a fixed buffer size x), if we underestimate the mean
Fig. 6. QoS degradation index vs. bandwidth interval (small time scale).
or/and the variance of the cumulative variable Xn (compared
to the real values), we will underestimate the MVA bound.
This means that we have an over-optimistic QoS estimation.
As this underestimated MVA bound serves as the starting
point to search the bandwidth amount yielding the required
QoS, we will reserve less bandwidth than it is in fact
required (in case of upward bandwidth updates) or release
more bandwidth than actually necessary (in case of
downward bandwidth updates). In any case, mis-provision-
ing occurs and we shall eventually suffer from QoS
degradations.
The incipient point of observation is that the under-
estimation problem mainly occurs when the traffic trend
changes from decreasing to increasing. To remedy such
undesirable situations, we first reveal an important obser-
vation (see, e.g. again in Fig. 4, windows 3–7).
Lemma 4.1. With ES technique, if we have a predicted load
smaller than the current measured load, then this under-
estimation remains as long as the aggregate load exhibits
increasing trend.
Proof. Wehavetoprovethat ifmjC1OmjOmjK1andmj Om�j
then mjC1Om�jC1.
Exploiting the ES technique and the assumption on
under-estimation in window j, we have
m�jC1 Z wmj C ð1 KwÞm�
j !wmj C ð1 KwÞmj Z mj:
Fig. 7. QoS degradation index vs. bandwidth interval (large time scale).
Table 3
Number of adjustments of different provisioning schemes (small time scale)
Bias/traf-
fic
MPEG WAN Ethernet
PS1 PS2 PS3 PS4 PS1 PS2 PS3 PS4 PS1 PS2 PS3 PS4
0.01 93 91 79 90 88 85 92 87 95 95 81 92
0.02 89 88 79 87 85 82 92 85 92 90 81 88
0.03 85 85 79 86 79 78 92 77 83 87 81 84
0.04 76 82 79 79 70 75 92 73 80 83 81 80
0.05 75 75 79 75 69 73 92 65 70 83 81 70
H.T. Tran, T. Ziegler / Computer Communications 28 (2005) 1862–18761870
Because of the increasing trend we already have
mj!mjC1;
from which it follows that m�jC1!mjC1. ,
Having identified the above causes of under-provision-
ing, we develop two enhanced versions of PS1 correcting
this impact. The basic idea is that we modify the prediction
rules as soon as we observe an evidence of increasing traffic
trend and under-estimation.
4.2.1. PS1* scheme: modifying prediction rules with linear
extrapolation
We change the prediction rule whenever we experience
first (let us say at the resizing window j) two facts together:
increasing traffic trend and under prediction, i.e. mjOmjK1
and mjOm�j . Recall that if we used the original prediction
rule we could compute m�jC1 :ZwmjC ð1KwÞm�
j . Instead
of it, we use the modified prediction that is done in two steps
as follows:
†
We first reset the predicted value m�j tomCj :Z mj C2ðmj KmjK1Þ:
†
Then we use the weighting parameter 0.5 for the ESprediction of window jC1, i.e.
m�jC1 :Z 0:5mj C0:5mC
j :
By doing this, we in fact assume a local linear increasing
trend of traffic. One can check that m�jC1Zmj C ðmjKmjK1Þ.
This modification is again applied in the window jC1 if
we still have mjC1Omj and mjC1Om�jC1, otherwise we
switch back to the normal ES rule according to (9), and so
on.
The same consideration is employed for the prediction of
the variance function Var{Xn,j} (nZ0, 1,.,NK1).
4.2.2. PS1** scheme: modifying prediction rules with
predicted increments
Similar to the previous approach, we modify the
prediction rule from the first time (i.e. window j) we
observe two facts together: increasing traffic trend and under
prediction. However, in this approach we use predicted
increments between the loads from two successive resizing
windows to give a load forecast as follows:
†
At the first window j, we resetm�j :Z mj Cz;
where z is a positive constant chosen appropriately as
will be explained soon. By doing this we ensure that the
original under-prediction in window j becomes over-
estimation, which in turn will have positive effects on the
estimation in the next windows.
†
For the following windows k, kRjC1, as long as mkOmkK1 (i.e. the increasing trend is still valid), we predictm�kC1 :Z m�
k CD�kC1 (12)
instead of using (9). The term D�kC1 refers to the predicted
increment (hence the name of the provisioning scheme)
which is forecasted based on the measured load
increments between two consecutive windows, and by
using the ES technique as follows. By definition, for
kRjC1 the measured increment between window k and
kK1 is DkZmkKmkK1.
The estimation of D�kC1 is that
D�kC1 Z wDk C ð1 KwÞD�
k :
Note that we initially set D�j Z0.
When the increasing trend stops, we switch back to the
original ES rule (9). Note that the same consideration is
employed for the prediction of the variance function
Var{Xn,j} (nZ0, 1,.,NK1).
Observe that the modified prediction rule of PS1** is
more sophisticated than that of PS1*. Firstly, unlike the
linear extrapolation in PS1*, where only two previous mean
load values are taken into account to give the predicted load
value, in PS1**, the monotone increasing update rule (12)
gives credit to all previous load increments Dk. Thus, it
produces the series of predicted values m�k which follows
better the increasing trend of the actual traffic. Secondly, the
effect of under-estimation is better alleviated by PS1** than
by PS1*, when an appropriate value of z is chosen. This is
proven by the following proposition.
Fig. 8. Delay violation probability (MPEG traffic, small time scale).
Fig. 10. Delay violation probability (WAN traffic, small time scale).
Fig. 9. Delay violation probability (MPEG traffic, large time scale).
Fig. 11. Delay violation probability (WAN traffic, large time scale).
Fig. 12. Delay violation probability (Ethernet traffic, small time scale). Fig. 13. Delay violation probability (Ethernet traffic, large time scale).
H.T. Tran, T. Ziegler / Computer Communications 28 (2005) 1862–1876 1871
Table 4
AGF values of PS1, PS2, PS1* and PS1** provisioning schemes
Small time scale Large time scale
Scheme/traffic MPEG, uoptZ0.772 WAN, uoptZ0.890 Ethernet, uoptZ0.804 MPEG, uoptZ0.788 WAN, uoptZ0.781 Ethernet, uoptZ0.737
PS1 0.880 0.898 0.913 0.704 0.721 0.840
PS2 0.916 0.914 0.914 0.683 0.803 0.848
PS3 0.750 0.830 0.841 0.443 K0.133 0.794
PS4 0.889 0.908 0.912 0.556 0.503 0.676
PS1* 0.909 0.935 0.895 0.788 0.814 0.847
PS1** 0.883 0.915 0.870 0.739 0.847 0.855
H.T. Tran, T. Ziegler / Computer Communications 28 (2005) 1862–18761872
Proposition 4.1. If z is chosen such that zO(1Kw)Dj,
whenever load under-estimation might happen, PS1**
performs better than PS1* in the sense that it produces a
smaller degree of under-estimation or does not under-
estimate at all.
Proof. See Appendix A.
4.3. Performance evaluation of the enhanced
provisioning schemes
We plot the delay violation probability as a function of
the delay bound in Figs. 8–13, which were obtained with
trace driven simulation for all the provisioning schemes we
have considered so far. The delay violation probability for
a given delay bound D is determined from the set of per-
packet delay samples collected in simulation according to
the formula:
PðdelayODÞ
ZNumber of delay samples with value bigger than D
Total number of delay samples:
In case of PS1** scheme, the specific delay bound
associated with the violation probability of 10K4 is
particularly marked in the figures.
The figures indeed demonstrate significant improvements
attainable with PS1* and PS1** schemes, ranking them to be
the best. The original target QoS P(delayO10 ms)!10K4 is
met closest by the PS1** scheme.3 Also note that the QoS
attained with simulation for the rest of schemes is worse
3 One can observe in Fig. 9 that in case of MPEG traffic, application of
large measurement slots leads to considerably worse QoS than the target
QoS. This is because the schemes assign the bandwidth calculated based on
large time scale (1200 ms) measurements, in which the smaller time scale
(40 ms) fluctuations are averaged out. In simulation, the traffic loads
measured in 40 ms slots, i.e. at a finer time granularity were used as the
input traffic. Consequently, the bandwidths allocated with regard only to
large time scale traffic dynamics fail to cope with small time scale traffic
fluctuations, resulting in worse QoS than the target QoS.
Our experiments have also indicated that measurement time slots with
length 40 ms prove to be a sufficient and reliable measurement granularity
applied in our provisioning schemes. Currently, we are working on the
consistent concept of the choice for the most proper measurement time
scale.
than the original QoS target, i.e. we only have
P(delayOD)!10K4 for such D value, which is significantly
larger than 10 ms. This QoS dissatisfaction is exactly due to
the effect of under-provisioning stemming from traffic under-
estimation during a certain number of windows which have
been investigated before in Section 4.2.
Table 4 reports the AGF values of all the provisioning
schemes. This is in fact Table 2 (presented earlier in Section
3.2) extended with the AGF values of schemes PS1* and
PS1**. Observe from Table 4 that in a major part of the
cases the PS1* and PS1** schemes have bigger AGF values
than other schemes, demonstrating their better goodness.
There remain some cases, when the obtained AGF values of
PS1* and PS1** scheme are slightly smaller than that of
PS1 and PS2 scheme. This is due to the degree of over-
dimensioning involved in PS1* and PS1** schemes at the
price of the QoS improvements. Note that in fact we do not
have extensive over-dimensioning. For example, in case of
the Ethernet traffic trace, the computed AGF values for
PS1* and PS1** are 0.895 and 0.870 in case of small time
scale provisioning, i.e. still in the range of the corresponding
AGFs of PS1 and PS2 (which is 0.91).
5. Potential applicability of the proposed provisioning
schemes
We briefly list in this section some typical scenarios, in
which the application of our provisioning is well con-
ceivable. The scenarios are namely (i) adaptive resizing of
high-speed LSPs (Label Switched Paths) in MPLS net-
works; (ii) adaptive resizing of customer-pipes in VPNs
(Virtual Private Networks); (iii) adaptive bandwidth
allocation of logical links in the Service Overlay Networks
architecture [1] for providing end-to-end QoS over inter
domains; (iv) and resizing of SLA between DiffServ
domains.
5.1. Resizing of LSPs in MPLS networks
In the context of MPLS technology, LSPs are considered
as tunnels accommodating the traffic over the MPLS
domain. By applying our provisioning schemes, for any
given tunnel the operator can adaptively resize the
allocated bandwidth in order to meet the required QoS of
H.T. Tran, T. Ziegler / Computer Communications 28 (2005) 1862–1876 1873
the incoming traffic. The application will involve the
deployment of periodical traffic monitoring at the ingress
router of the LSP and the execution of our bandwidth
assignment scheme.
Note that signalling is required for bandwidth reassign-
ments. However, we can exploit the refresh messages in the
soft-state RSVP-TE [10], the current signalling protocol for
MPLS for this purpose.4 Thus, we do not need additional
signalling overhead compared to the current RSVP-TE
MPLS architecture to achieve QoS-aware adaptive
provisioning.
5.2. Resizing of customer pipes in VPN
(Virtual Private Networks)
Virtual Private Networks (VPN) is the concept of serving
a special group of customers (be they end users or
institutes). The service providers reserve bandwidths
between the end points to convey traffic demands.
The bandwidth is allocated using either pipe or hose
model [3]. In order to offer services competent with those of
networks of physical private lines, encryption and quality
guarantees are required to be delivered in VPNs. As long as
the pipe concept is followed, our proposed provisioning
schemes in fact provide an efficient solution for the
bandwidth management of the pipes, or in other words,
the virtual links.
Concerning the implementation issues, the same con-
siderations as in the LSPs case are valid. The concrete
signalling procedure to adapt the needed bandwidth depends
on the underlying technology of the given VPN. The
signalling protocol for example can be Beagle [11], or
RSVP. Note that the monitoring capability is required only
at the ingress router of the virtual link.
5.3. Resizing of SLA between DiffServ domains
One way for providing QoS over multiple network
domains is to deploy the DiffServ architecture in individual
network domains and employ peer-to-peer SLA (Service
Level Agreement) to control the traffic between neighboring
domains. Such SLAs specify the amount of traffic that can be
carried over the inter-domain link. Through this link, Virtual
Leased Lines (VLLs) can be established to ensure point-to-
point QoS. Our provisioning schemes apply to dynamic
resizing of such VLLs in order to meet the required QoS.
The signalling for bandwidth adjustments again is
resolved in a request-acknowledge manner involving edge
routers and an automated management entity like a
Bandwidth Broker (BB). The edge router of one domain
accomplishes traffic monitoring and initiates the bandwidth
adjustment request toward the BB. The BB processes
4 The default period between refreshing messages is 30 s but this value
can be configurable.
this request, carries out the re-assignment, updates its
databases if necessary, and sends back the acknowledge-
ment to the router.
5.4. Resizing of logical links in SON
(Service Overlay Networks)
Service Overlay Network (SON) is the alternative
concept for providing inter-domain end-to-end QoS [1].
SON is a network lying on the top of individual domains.
In SON, devices called service gateways are deployed in the
underlying domains and interconnected with logical links.
Each logical link is in fact a path comprising a series of IP
links in the underlying domains. The bandwidths of logical
links are purchased by SON from the underlying network
domains. By adaptively adjusting the bandwidth of the
logical links of the SON, efficient bandwidth management is
achievable which makes the SON deployment and operation
more profitable.
The traffic measurements have to be done at the service
gateways. This means that the monitoring capability should
be integrated into the software module of the gateways, as
similarly required for the ingress router in case of LSPs or
customer pipes of VPNs. In addition, signalling messages
must be exchanged between the gateways of the SON and
the routers of the underlying domains to declare and process
the bandwidth allocation and/or release requests. Note that
the application thus needs also the support of the underlying
networks.
6. Related work
There has been a large amount of work in the area of
adaptive bandwidth provisioning. Without the goal of
providing a complete survey, we briefly describe below
some recent provisioning schemes that share one or more
common aspects with our work.
Beyond the two already investigated schemes PS3 and
PS4 [1,3], [12] proposes a scheme to adaptively allocate the
bandwidth between bandwidth brokers of peer DiffServ
domains. This work has two common aspects with our work.
The first aspect is the aggregation nature of the accom-
modated traffic. The second aspect is the measurement-
based nature of the scheme, i.e. the aggregate traffic load is
collected in a timeslot-based manner and resizing is done in
a window-based manner. However, in spite of these
similarities, there are some major differences compared to
our schemes. Not only the specific techniques used in the
scheme of [12] (a discrete Kalman filter and a transient
analysis of a M/M/N queue) are different, but more
importantly is its special flow-oriented nature. In essence,
[12] assumes a priori fix and identical bandwidth require-
ment for each traffic flow. The bandwidth to be provisioned
thus is expressed in the number of flows. Because of the lack
of specifying how this per-flow bandwidth value could be
H.T. Tran, T. Ziegler / Computer Communications 28 (2005) 1862–18761874
deduced from the packet level QoS, the scheme in [12]
cannot be directly used if the latter one is the target for
provisioning.
Ref. [13] is another recent work proposing a measure-
ment-based scheme for adaptive bandwidth allocation for
aggregate traffic. It advocates the use of Fractional Stable
Noise (i.e. the a-stable long-range dependent stochastic
process) as a model for the aggregate traffic. However, [13]
adopts this specific traffic model essentially only for having
an efficient linear traffic prediction, and not for the
derivation of mapping rules between QoS requirement and
bandwidth. The traffic prediction is namely based on the so
called minimum dispersion criterion, which relies in turn on
the properties of a-stable process. No explicit mapping
between packet level QoS requirements and bandwidth to be
provisioned is provided. Instead, the authors simply propose
to over-allocate the bandwidth with a certain over-allocating
factor. Consequently, in case packet level QoS requirements
are given as the target for provisioning, the scheme of [13]
can neither be directly applied.
Ref. [14] works out a provisioning scheme for VPN links
involving a specific traffic prediction called Linear Pre-
dictor with Dynamic Error Compensation (L-PREDEC).
The provisioning scheme uses the so called over-reservation
factor a to set the bandwidth to aserrCm, where serr is the
mean square error of the predictor, m is the measured mean
rate. However, this work does not provide any explicit
mapping between statistical QoS and bandwidth to be
provisioned. Again, if we are about to achieve a target
statistical QoS on packet delay, there is no means to choose
the right value of the over-provisioning factor a.
One of commercially available solutions for dynamic
bandwidth provisioning is the Cisco MPLS AutoBandwidth
allocator [15], where the local maximum approach is used.
The average traffic rate is sampled in each measurement
time slots. The bandwidth of a given MPLS tunnel is
adjusted after each configurable resizing interval compris-
ing a certain number of measurement time slots. The
bandwidth for the next resizing interval is set to the largest
average rate of the last interval. This provisioning scheme is
very simple, but may practically be inefficient due to the
lack of an explicit QoS-aware respect.
In summary, neither of the schemes available in [1,3,12–
15] is suitable for a direct use, when packet level statistical
QoS is considered as the explicit target for the provisioning
task. To our best knowledge, only the work from [16]
represents an alternative of our scheme. This work addresses
the same issue as ours, i.e. to provision a link given the
packet level delay violation probability as the target QoS
requirement. To relate this QoS requirement to the needed
bandwidth, [16] proposes to use the 2-scale Fractional
Brownian Motion traffic model. However, beside a different
traffic model, this work also differs from our work in several
points. The parameters of the traffic model are calculated
off-line from measurement data of traffic traces by means of
the technique of empirical linear regressions. Moreover,
unlike our solution, no sophisticated traffic prediction rules
are involved in the scheme of [16] to improve its
performance.
7. Conclusions
Our research was inspired by the fact that bandwidth
provisioning is done mostly in a utilization threshold based
manner. However, the role of the chosen utilization
threshold in QoS is often not tackled or even neglected
in previous research work. In contrast to this, we worked
out novel provisioning schemes that render the bandwidth
with explicit respect to the target QoS like packet delay
and packet loss ratio. We have first developed two novel
provisioning schemes called PS1 and PS2, incorporating
periodical measurements, predictions of traffic dynamics
and the Gaussian traffic model. Investigations based on our
trace driven simulation and on the AGF (Average
Goodness Factor) assessment have clearly shown the
advantage of the developed schemes compared to some
other existing ones.
Furthermore, the experiments with PS1 and PS2 schemes
have raised the need for further enhancement efforts
concerning signalling overhead reduction and avoidance
of under provisioning. Our efforts have resulted in two
improved versions of the PS1 scheme, to which we referred
to as the PS1* and PS1** schemes. Thorough investigations
confirm that these PS1* and PS1** schemes indeed perform
very well regarding both QoS achievement and economical
resource usage. As a summary, we conclude that
†
With our schemes, bandwidth is adaptively adjusted withexplicit regards to the live traffic dynamics and the target,
packet level statistical QoS. The bandwidth calculation
relies on a single binary search, which does not require
cumbersome computational efforts. Our schemes enables
efficient provisioning in the sense that they result in
neither excessive over-provisioning, nor severe under-
provisioning.
†
The proposed schemes bear a wide range of potentialapplications. Whenever the aggregation degree of the
traffic is sufficiently high to justify the application of the
Gaussian model, and statistical QoS is desirable with
economical resource usage, the use of our schemes is
well grounded.
Some associated work items remain as topics requiring
further investigations. For example, we are currently
working on the insights into the effect of the length of
measurement time slots. We have stated earlier that the
proposed schemes work well with sufficiently fine granu-
larity of traffic load measurement, which for example is in
range of 40 ms. A rigorous concept of choosing the most
proper measurement granularity is the goal of our current
research.
Table A1
The number of windows where the prediction rule must be changed and
among them the number of those, where zZm�jK1 KmjK1 O ð1KwÞDj is
held
MPEG WAN Ethernet
Changed-windows 28 31 20
H.T. Tran, T. Ziegler / Computer Communications 28 (2005) 1862–1876 1875
Acknowledgements
This work has been partly supported by the Austrian
government’s Kplus Competence Center Program, and by
the European Union under the E-Next Project
FP6-506869.
Proper-windows 15 16 17Appendix A. Proof of Proposition 4.1
The proposition states that:
If z is chosen such that zO(1Kw)Dj, whenever load
under-estimation might happen, PS1** performs
better than PS1* in the sense that it produces a smaller
degree of under-estimation or does not underestimate
at all.
Proof. For clarity, we will add to the subindex of m* the
term PS1* or PS1** to indicate the scheme being applied to
get this predicted value.
Recall that the original prediction rule is changed in
window j. Keeping it in mind, we have the following
relation:
m�jC1;PS1�� Z m�
j;PS1�� CD�jC1
Z mj Cz CwDj C ð1 KwÞD�j
Z mj Cz CwDj ðremember that D�j is set to 0Þ
Omj CDj
Z mj C ðmj KmjK1Þ Z m�jC1;PS1�
(A1)
The above inequality is valid if we choose an appropriate
z, such that zO(1Kw)Dj. The inequality (A1) basically
means that if the traffic dynamics is such that changing the
prediction rule in window j according to PS1* scheme still
leads to under-estimation in widow jC1, then applying the
prediction rule of PS1** scheme surely brings either
smaller under-estimation or does not produce under-
estimation at all.
Now, let us consider the case when under-estimation
occurs again in window jCl(lO1), after the modified rule
has been applied in window j. We will show that using
PS1** scheme (i.e. applying the rule (12) from window j)
yields better performance than using PS1* scheme (i.e.
applying linear extrapolation in window j, and then the
normal ES technique (9) from window jC1 until window
jClK1).
Since from window j to window jCl, under-estimation
does not occur, the ES technique (9) is applied in PS1*
scheme from window jC1 until window jClK1. Thus, we
have
m�jC1;PS1� Z wmjClK1 C ð1 KwÞm�
jClK1;PS1�
!maxðm�jClK1;PS1� ;mjClK1Þ
Z m�jClK1;PS1� :
Recursively applying the above argument, it follows that
m�jCl;PS1� !m�
jClK1;PS1� !/!m�jC1;PS1� . Thus, because of the
inequality (A1) we arrive at
m�jCl;PS1� !m�
jC1;PS1�� (A2)
On the other hand, if PS1** scheme is applied from
window j, then due to rule (12) we have
m�jCl;PS1�� !m�
jC2;PS1�� !/!m�jCl;PS1�� (A3)
Combining (A2) and (A3) follows that
m�jCl;PS1� !m�
jCl;PS1�� ; (A4)
and this completes our proof. ,
Remark. In the analysis reported in the paper, we set
zZm�jK1KmjK1. With our specific traffic traces, we have
checked and seen that more than 50% of the cases when we
have to modify the prediction rule, the condition zZm�jC1K
mjK1O ð1KwÞDj is held. More precisely, over a period of
100 resizing windows, Table A1 shows the number of
windows in which we have to change the prediction rule
(referred to as changed-windows) and among them the
number of windows in which the above mentioned
inequality is true (proper-windows).
Despite that zO(1Kw)Dj is not always true, we obtain
fairly good results with PS1** scheme, which are still better
than those of PS1* scheme. This was demonstrated in
Section 4.3.
References
[1] Z. Duan, Z.-L. Zhang, Y.T. Hou. Service overlay networks: SLAs,
QoS and bandwidth provisioning, in: Proceedings of IEEE 10th
International Conference on Network Protocols (ICNP), 2002, pp.
334–343.
[2] K. Papagiannaki, N. Taft, Z.-L. Zhang, C. Diot. Long-term forecasting
of internet backbone traffic: observations and initial models, in:
Proceedings of IEEE INFOCOM, vol. 2, 2003, pp. 1178–1188.
[3] N.G. Duffield, P. Goyal, A. Greenberg. A flexible model for resource
management in virtual private networks, in: Proceedings of
SIGCOMM, 1999, pp. 95–108.
H.T. Tran, T. Ziegler / Computer Communications 28 (2005) 1862–18761876
[4] R.G. Addie, M. Zukerman, T.D. Neame, Broadband traffic modeling:
simple solution to hard problem, IEEE Communications Magazine 36
(8) (1998) 88–95.
[5] J. Choe, N.B. Shroff, A central limit theorem based approach for
analyzing queue behavior in high speed networks, IEEE/ACM
Transactions on Networking 6 (5) (1998) 659–671.
[6] H.S. Kim, N.B. Shroff, Loss probability calculations and asymptotic
analysis for finite buffer multiplexers, IEEE/ACM Transactions on
Networking 9 (6) (2001) 755–768.
[7] W.S. Wei, Time Series Analysis, Addison-Wesley, 1990.
[8] MPEG traces. ftp-info3.informatik.uni-wuerzburg.de/pub/MPEG/
[9] The Internet traffic archive. http://ita.ee.lbl.gov/index.html
[10] D. Awduche, L. Berger, D. Gan, T. Li, V. Srinivasan, G. Swallow. RSVP-
TE: Extensions to RSVP for LSP Tunnels. RFC3209, December 2001.
[11] L.K. Lim, J. Gao, T.S. Eugene Ng, P.R. Chandra, P. Steenkiste,
H. Zhang, Customizable virtual private network service with QoS,
Computer Networks 36 (2001) 137–151.
[12] T. Anjali, C. Scoglio, G. Uhl, A new scheme for traffic estimation and
resource allocation for bandwidth brokers, Computer Networks 41 (6)
(2003) 761–777.
[13] M. Lopez-Guerrero, J.R. Gallardo, L. Orozco-Barbosa, D. Makrakis,
On the linear prediction of aggregate network traffic and its
application to dynamic resource management, Computer Communi-
cations 26 (12) (2003) 1341–1352.
[14] W. Cui, M.A. Bassiouni, Virtual private network bandwidth manage-
ment with traffic prediction, Computer Networks 42 (6) (2003)
765–778.
[15] Cisco MPLS AutoBandwidth Allocator for MPLS traffic
Engineering: A Unique New Feature of Cisco IOS
Software. http://www.cisco.com/warp/public/cc/pd/iosw/prodlit/
mpatbwp.htm
[16] C. Fraleigh, F. Tobagi, C. Diot. Provisioning IP backbone networks to
support latency sensitive traffic, in: Proceedings of INFOCOM, vol. 1,
2003, pp. 375–385.