Skip to main content

A VoIP Traffic Modeling for the Differentiated Services Network Architecture

  • Conference paper
  • 732 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2662))

Abstract

We propose a traffic modeling, (σ,ρ,ξ)-model, which is suitable for QoS provisioning with hard bound on performance degradation. ξ in (σ,ρ,ξ)-model defines the portion of data that fails to conform to the (σ,ρ)-constraint. An exact analysis of a discrete-time non-buffered token bucket is presented to introduce the (σ,ρ,ξ)-model. The analysis is verified through simulations, and is shown to be more accurate than a fluid model approach. The applicability of the (σ,ρ,ξ)-model is examined in the assessment of the required resources for aggregate VoIP traffic. It is observed that the allowance of bounded degradation enhances the resource utilization significantly. We also observe that the buffer adjustment is preferable to the bandwidth adjustment in accommodating a variety of traffic burstiness.

This work was supported by grant No.R01-2000-00280 from the Korea Science and Engineering Foundation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Goralski, W.J., Kolon, M.C.: IP Telephony. McGraw Hill, New York (2000)

    Google Scholar 

  2. Davie, B., Charny, A., Bennett, J.C.R., Benson, K., Le Boudec, J.Y., Courtney, W., Davari, S., Firoiu, V., Stiliadis, D.: An Expedited Forwarding PHB(Per-Hop Behavior). RFC 3246 (March 2002)

    Google Scholar 

  3. Blake, S., Black, D., Carlson, M., Davie, E., Wang, Z., Weiss, W.: An Architecture for Differentiated Services. RFC 2475 (December 1998)

    Google Scholar 

  4. Cruz, R.L.: A Calculus for Network Delay, Part I: Network Elements in Isolation. IEEE Trans. Information Theory 37(1), pp. 114-131 (1991)

    Google Scholar 

  5. Tucker, R.G.: Accurate Method for Analysis of a Packet-Speech Multiplexer with Limited Delay. IEEE Trans. Commun. COM-36, 479–483 (1988)

    Google Scholar 

  6. Hluchyj, M.G., Yin, N.: On the Queueing Behavior of Multiplexed Leaky Bucket Regulated Sources. In: Proc. IEEE INFOCOM 1993, pp. 672–679 (1993)

    Google Scholar 

  7. Sidi, M., Liu, W.Z., Cidon, I., Gopal, I.: Congestion Control Through Input Rate Regulation. IEEE Trans. Commun. 41(3), 471–477 (1993)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jeong, D. (2003). A VoIP Traffic Modeling for the Differentiated Services Network Architecture. In: Kahng, HK. (eds) Information Networking. ICOIN 2003. Lecture Notes in Computer Science, vol 2662. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45235-5_51

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45235-5_51

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40827-7

  • Online ISBN: 978-3-540-45235-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics