Professional Documents
Culture Documents
FUZZY ARTMAP
ABSTRACT
The traditional approach to admission control assumes that traffic descriptor is provided
by the user or application for each flow prior to establishment for the real time
multimedia communication. How ever this approach suffers from several problems. So,
we propose a network-based endpoint admission Control system for scalable QoS
guaranteed real-time communication services. This system is based on a sink tree-based
resource management strategy, and is particularly well suited for DiffServ based
architectures which keeps minimum signaling overhead by performing the admission
decisions at the end points. In addition, the proposed system integrates routing and
resource reservation along the routes, and therefore displays higher admission probability
and better link resource utilization. This approach achieves low overall admission control
overhead because much of the delay computation is done during system configuration,
and so resources can effectively be pre-allocated before run time. We investigate a
number of resources sharing approaches that allow resources to be efficiently re-allocated
at run time with minimized additional overhead. We provide simulation experiments that
illustrate the benefits of using DS tree-based resource management for resource pre-
allocation and for routing, both with and without resource sharing.
∑d
baseline for comparison with other sharing strategies.
Yk = max j
………..(7)
path∈Sk
j∈path
Path Sharing: In path-sharing resources are shared
along overlapping paths of the same DS tree. In our In our case, a formula for the local delay dk at
example, the 11th admission request is admitted Server k can be formulated as follows based on [1, 4,
because the path from Node 2 to Node 4 (Link 2 and 6, 22]. β is the burst size of source traffic of the flow
Link 3) has still resources available. As a side effect, in the real time class. Sk is the set of all possible
if Node 2 has admitted 20 flows, it starves Node 1. paths upstream from Server k for flows that traverse
So the resource is shared only along overlapping Server k. Yk is the maximum delay a flow
paths of the same tree. experienced before arriving at Server k. N is the
number of input links to Server k. α is the portion of
Tree Sharing: Assume that in our example there is the link resource allocated for the real-time class
no available bandwidth in the tree to accept the 11th traffic. Because the upper bound has been derived
flow at Node 2. With tree-sharing the admission under the assumption that the worst-case local delay
control attempts to use bandwidth allocated to other comes with the maximum workload, there is no
sink trees on the path from Node 2 to Node 4. As dynamic, run-time dependent variable in Equation
long as there is such a tree, the 11th request is (6). If we assume that Yk is a constant (of course this
accepted. In this approach, resource is shared is not true, i.e., each node has different values of Yk),
between trees that share the same set of consecutive the upper bound is a monotone increasing function of
links. α. This is exactly correspondent to the common
sense that the higher the workload, the larger the
Link Sharing: In this approach, the new request is end-to-end delay.
admitted as long as there are resources available on
any tree along the requested path regardless of which Sharing Case: In an attempt to compare the worst-
tree the resource originally belongs to. The DS tree case end-to-end delays for the different resource
only determines the path for a flow and the resources sharing strategies, we first represent the
are shared among all tree edges in the domain. mathematically according to the strategies, because
the bandwidth for the real time class is limited by α
5. END-TO-END DELAY ANALYSIS on each link. Followings are the notations of
bandwidths for the representation of α.
In this section we investigate the DS-tree’s effect
on the worst-case end-to-end delay in the presence of
resource sharing. Cl,u =Cl −(Bl,1 +⋅⋅⋅+Bl,u−1 +Bl,u+1 +⋅⋅⋅+Bl,t )
t
=Cl − ∑Bl,u
No-Sharing Case: In order to calculate the worst-
case end-to-end network delay, we model the …..(8)
network as a collection of servers [4]. Once we get i=1,i≠u
an upper bound on the delay on each server, we can
easily obtain the end-to-end delay by simply Bl ,u = Rl1,u + ⋅ ⋅ ⋅ + Rld,u + ⋅ ⋅ ⋅ + Rln,u ..(9)
summing up all the worst-case local delays. For
simplicity of analysis, we consider a special case in Where, Cl represents the capacity of Link l. Since
which we have only two classes of traffic: real-time we consider only the two classes in this paper, any
with priority and non-real-time best-effort traffic link capacity consists of two parts: one for real-time
such that the real-time traffic is never delayed by non priority class
real-time best-effort traffic. In addition, all flows in
( ∑ u =1 B l ,u )
t
the real-time class have the same traffic and the other for the traffic by
characterization in terms of bandwidth and leaky
buckets parameters. Best-effort basis ( Bbest-effort ). In other words, Link l
B
Finally the input real-time traffic to the network has t number of tree-edges, each of them has its own
is constrained by (β, ρ) [1]. Inside the network allocated resource and the rest of the resource of
routers are not flow-aware, therefore there is no Link l is for the best-effort traffic. Cl,u means the
traffic regulator. resource available for the edge of DS -tree u on Link
l. Since the real-time class has priority, Cl,u has two requirements in both bandwidth and network delay.
types allocations: one for the resource for the best- So, we tried to achieve by a Fuzzy ARTMAP
effort traffic on Link l and the other for the resource algorithm is, to always produce a set of sink trees in
allocated for DS-tree u in Link l. Bl,u is the resource the polynomial time with the minimum network
allocated to DS-tree u on Link l. Rdl,u is resource delay and with or without reduced constraints for a
requirement for the path from Node d to the sink of given network. With the link capacity, we think that
DS-tree u which passes Link l. Now four variants of it is usually large enough to accommodate the path
α are given below using these notations. bandwidth delays. However, because we do not try
to find an optimal path value, which might be
minimized reduction in requirement, we do not say
Rld,u either our heuristic algorithm produces best possible
αn = …… (11) DS-trees or it guarantees performance with a certain
C l ,u percentage of difference from the optimal. The
reduction has two cases: One is for link capacity and
Bld,u other is for network delay.
αp = …….(12)
C l ,u 6.1. RESOURCE ALLOCATION PROBLEM
∑ Bl ,u + ⋅ ⋅ ⋅ + ∑u =1 Bδ ,u
n1 nδ
The video stream needs adequate resources at the
αt = u =1 ….(13) server, network and the client with constraints in
C l + ⋅ ⋅ ⋅ + Cδ DiffServ architecture. It is processed at the source
processor, transmitted over the network and then
∑
t processed at the destination. However, the cost of
Bl ,u
αt = u =1
………(14) the corresponding resource results in lower or higher
utility for the DS trees. The algorithm always stops
Cl with a DS tree for each out port. So if the given
network has t number of output ports, the algorithm
The above four equations (αn, αp, αt, αl) are for no iterates exactly t times. Since we wish to construct
sharing, path sharing, tree sharing, and link-sharing DS-tree in the polynomial time, we limit the
respectively. These equations are rather execution of the loops for just one time for each
straightforward according to the definitions of violation such that the loop execution are bounded
sharing strategies in the previous section. In αt, δ by number of edges |E| for each DS-tree. This
means the number of trees that share a set of links apportioning of the resources has to be in real time
under consideration. Based on the common sense, a and the allocation time is a part of the serialization
smaller value of α will get a tighter value of the delay to develop DS-trees. The ARTMAP [27] is
upper bound. Moreover, since we know the paths the elastic enough able to either find an existing cluster
flows will take, we can take advantage of it in or plastic enough to form a new QoS cluster
calculating end-to-end delay. However, the four corresponding to a SLA.
equations of α reveal little about the order of
magnitude among them. Because the values of á and 6.2 ARTMAP ARCHITECTURE
Yk are determined in the DS tree construction
process, and we know the final values only when the The ARTMAP neural network [28] is an
trees are constructed, they cannot be compared architecture that can learn arbitrary mappings from
before the construction is completed. In comparison digital inputs of any dimensionality to outputs of any
of Equation (11) and (12), the inequality is obvious dimensionality. The architecture applies incremental
because αp is always not smaller than αn, because supervised learning of recognition categories and
Rdl,u is expected to less than or equal to Bl,u at best. multidimensional maps in response to arbitrary
The worst case end-to-end delay obtained here is sequences of analog or binary input vectors, which
used in the heuristic algorithm for constructing DS- may represent or crisp set of features. The ARTMAP
trees proposed in the next section. neural network consists of two ART modules
designated as ARTa and ARTb, as well as an inter
6. ALGORITHM DESIGN ISSUES FOR ART module. Inputs are presented at the ARTa
CONSTRUCTING DS TREES module, while the outputs are presented at the ARTb
module. The Inter ART module includes a MAP
Although finding a set of DS-trees for a given field, whose purpose is to determine whether the
network under the three constraints is NP-Complete mapping between the presented input and output is
[26], we need a practical algorithm which can always the desired one. The vigilance parameter constraints,
produce a set of DS-trees in the polynomial time the maximum size of the compressed representations
which may or may not have the reduced of the input/output patterns. The range of the
vigilance parameter is the interval [0,1]. Small values approach for both resource allocation and path
of the vigilance parameter, results in coarse selection. The network-based endpoint admission
clustering of the patterns, while large values lead to control proposed in this paper cannot be compared
fine clustering. ART is a clustering algorithm that directly to any host-based endpoint admission
operates on vectors with discrete-valued elements. control in terms of performance, because the latter
Adding a further layer of processing (the “MAP mainly focuses on the probing technique, which
field”) to ART yields a supervised clustering cannot guarantee both end-to-end delay and
algorithm. During learning, ARTMAP is presented bandwidth for the flow’s lifetime. First of all, Figure
with training vectors that have been labeled 2 shows the topology of the MCI ISP-backbone
according to the class to which each belongs. The network, which we use throughout the experiments.
ART module assigns the current training vector to a In the first set of experiments, all routers (black and
cluster. gray) can act as edge routers and core routers as well.
This means that the flows can arrive and leave at
ARTMAP Algorithm: every router. In a second set of experiments, black
nodes are edge routers and gray nodes are core
Step1: Application, User & Network parameters routers. We consider two classes of traffic in this
are given; simulation study:
Step2: Out port = t, Iterate for each output port;
Step3: Construct the DS-tree, for each constraint;
Step4: If DS-tree not constructed then
Step5: If link capacity violated then
Reduce the bandwidth requirement,
And Go to step 3;
Step6: else Network delay violated then
Reduce the Network delay requirement
And Go to step 3;
End;
Step7: else output is the DS-tree;
End;
.4
Flat- UBAC no- Path Tree Link 0 20 40 60 80 100 120 140 160
Item Fixed sh. Sh. -Sh. -Sh. call-arrival- rate
.8
tree-sharing by the same argument (resource
.7
fragmentation) mentioned above.
.6
.5
.4
Number-of-links-per-accepted-call
.3
.2
.1
0 0 20 40 60 80 100 120 140 160
call-arrival- rate
.8
utilization. The point is that although the total
amount of allocated resources are the same, the .7
utilization depends on how the resources are
allocated. Therefore the admission probability will .6
be better with an efficient resource allocation. The
big difference between 50% improvement in .5
.8
8. CONCLUSIONS
resource-utilization-rate
.7