Documente Academic
Documente Profesional
Documente Cultură
Notice that
= maximum packet size eligible for transmission in
link . Furthermore, it is all usually assigned as 1500B by
default.
3.3 Weakness of max-min fairness principle Consequently, according to max-min principle and
equation 3.1, . Therefore, will suffer from
Under the previous mentioned concepts and conditions, all
packets will be treated equally and QoS will not be delay since at least two packets from will be served
provided. Therefore, assigning a weight for each user before the departure of packets.
could apply some Quality of Service to the algorithm. 3.3.2 Congestion predicament
Weighted Fair Queuing (WFQ) proposed by Demers [3]
provides such functions. However, in the presence of According to max-min principle and conditions, in the
congestion, WFQ will assign the same weight for all the occurrence of congestion all packets will be treated equally
flows or in other words it would be a fair queuing. This and this will be with the tradeoff for real-time application
section reveals three primary weakness of max-min which and hence QoS is not supported in such situation. In other
has been exploited form malicious user to monopolize the words, sensitive application such as real-time application
bandwidth. will not receive any priority over the others in the
occurrence of congestion which leads to enormous
3.3.1 Small packet predicament degradation in its reliability and performance.
Misbehaved users could establish a connection and keep 3.3.3 Concurrent connection predicament
sending packets with smaller size than other applications
and hence, they will be eventually allocated more Concurrent connection is misbehaved attitudes which
bandwidth than others. For example, the smallest packet recently gather attention by various users and several
size for telnet, which is probably very small, is about 45 software have been designed to efficiently accomplish such
bytes including the IP header of 20 bytes and TCP header behavior. Even though, users are not aware of the
of 20 bytes. That means the data in this packet according to unfairness caused due to the utilization of such software,
real data taken using Snoop, in figure 3.1 is 5 bytes1. these greedy application should be stopped by imposing
network mechanism on them and hence, users will not use
If we have taken in account that this specific packet has it anymore. Next section is designed to explore the
used the minimum size of TCP header and its data is about previous mentioned three issues with examples and
5 bytes, we will estimate that the reiteration of such packet simulation support.
is rare in the network. Consequently, greedy users could
send packet with minimum data and bursty behavior and IV. MAX-MIN CHARGE
consequently, will be allocated more bandwidth than Section III reveals the weakness of max-min principle and
others. This could be implemented in faster downloading the inefficient fairness and protection provided by it
of a webpage using multiply HTTP connection for each adoption in scheduling mechanism. This weakness is
object in the page. This assumption is been proofed in next exposed after the development in computer and network
sub-section using simulation aids. applications such as the greedy software and the real-time
applications. Therefore, there are demands for a new
principle to be adopted which effectively provides better
fairness and higher protection.
Max-min charge is proposed in this paper. The concept of
max-min charge and its condition is presented in this
section. Analytical analysis is also, discussed and next
section provide some comparison between max-min
fairness and max-min charge.
4.1 Principle of max-min charge
Max-min charge [17] is basically based in the allocation of
charges among all users. In other words, blocking
transmission is imposed in the flows in accordance to
specific conditions. By adopting such principle, scheduling
Figure 1.3: IP packet for telnet application mechanisms are providing better fairness and higher
protection.
Let take this scenario, consider a link shared by two users
. is a misbehaved user establishing multiple Before the conditions and the principle of max-min charge
connections (HTTP for example). Moreover, assume that are illustrated further, various definitions and lemmas
sending small packets with fixed length of and with a should be explained.
bursty behavior. is a normal user establish VOIP
Consider a shared resource R and a set of users u that
connection with packet length of . Notice that
contend R with demands D = { }. Assume that
VOIP packets are normally not less than 80 bytes [16]2.
there are two policies. is used to determine bandwidth
allocation and to determine the
charge (blockage) allocation .
1
Note that this is a mean size not the minimum size. Minimum size of
data included in telnet packet could be as small as 1 byte. Definition 4.1
2
The assumption of 80 bytes ignores the header compression since
misbehaved user could perform it as well.
The policy is considered true if it respect the following Definition 4.5
conditions for all possible demand D:
A specific flow considered as saturated once
1. for all its queue size reaches 95% and above.
This means that resource allocation for user should Definition 4.6
not be negative since the negative sign implies the
The policy considered active if it satisfied the following
feeding of the resource from user side.
constraints:
2.
1.
This highlights two points: This means that to activate such policy, the output
buffer B should reach or exceed 25% of its
a. The sum of resource allocation for all users
capacity.
should not exceed the total resource available
2.
for the link shared.
The number of backlogged flows should be equal
b. is limited and finite.
to 2 or more.
3.
Property 4.4
This condition implies that the assigned resource for
user should not exceed its demand.
Now we assume that has the following properties: This property identifies the greedy user from other users.
Property 4.1 Therefore, any flow has a reception rate double or more the
most second user is considered as a greedy user.
Non of the flows is assigned larger resource than others
with the same demand. Property 4.5