Extending diffserv architecture: integration of idcc and rmd framework
ΕκδότηςΠανεπιστήμιο Κύπρου, Σχολή Θετικών και Εφαρμοσμένων Επιστημών / University of Cyprus, Faculty of Pure and Applied Sciences
Place of publicationΚύπρος
Google Scholar check
MetadataΕμφάνιση πλήρους εγγραφής
The rapid growth of demands that is being observed during the last few years shows the unavailability of current solutions to provide QoS. Since it is expected that these demands will continue to increase rapidly, much research is conducted so that more effective QoS schemes will be proposed. Current research is focusing on two architectures, the IntServ  and the DiffServ . Researchers also understand the need to control the congestion level in the network, since congestion is one of the reasons that current Internet provides poor QoS. Recently, Resource Management in DiffServ (RMD) and Intergraded Dynamic Congestion Control (IDCC), two schemes, which aim at providing QoS, were proposed. Each one is focusing on a different issue that must be solved, in the context of QoS. RMD proposed in , extends the DiffServ principles with new ones, necessary to provide dynamic resource management and admission control in DiffServ domain. IDCC is controlling the traffic using information on the status of each queue in the network. It is based on a nonlinear model of the network that is generated using fluid flow consideration [16, 26, 27, 28]. Both schemes, RMD and IDCC, are using the basic principles of DiffServ architecture to aggregate the flow to classes. The aim of this Master Thesis is to integrate RMD and IDCC, in a more effective scheme, which will use the same framework and will be able to handle both real time and elastic applications. The basic goal is to secure high utilization and bounded delay and loss. Furthermore, the network is to comply with the demands each traffic class sets. In order to evaluate the proposed scheme, NS-2 simulator was used. The simulation results demonstrate the effectiveness of the integrated RMD - IDCC scheme, since it secures all the desired network behavior and especially the expected high utilization, and bounded delay and loss.