Professional Documents
Culture Documents
Published with minor revisions in B.T. Tech. J. Vol. 23 No. 2 (April 2005) pp. 232-239
Having only “mostly peak time” subscribers, ISP 1 (top) has a clear 24 hour periodicity,
which is not the case for ISP 2 (bottom), whose “P2P” (and to a lesser extent “FTP”)
Manuscript as submitted
Published with minor revisions in B.T. Tech. J. Vol. 23 No. 2 (April 2005) pp. 232-239
users absorb all available off-peak bandwidth (continuous black line). So during peak
periods, the resource is about evenly distributed between both ISP’s, but overall, ISP 2
consumes a lot more bandwidth. However, average QoS is better for ISP 1 customers,
because at peak time (when competition is at its fiercest) the resource is evenly
distributed between ISP’s and the “Browsing” and “Multimedia” type subscribers of ISP
2 have to share their half with “P2P” users (unlike their ISP 1-affiliated counterparts).
This is also what leads to the awkward situation where the average experience of
heavyweight “P2P” users (measured over a 24 hours sliding time window) is actually
better than that of the more moderate subscribers. In short, at peak time, they both suffer
equally, but only the “P2P” type make up for it when bandwidth availability increases
(i.e. late night and early morning hours).
4.2 ISP “fair share”:
One possible management strategy applicable at the wholesale provider level is to base
the share of the bandwidth allocated to each ISP on the ratio between an agreed quota and
its users’ recorded activity over a predefined time window (also known as “fair share”
policy). This would probably be implemented using a weighted round-robin-like
procedure, with the weights being updated either in real time (which implies using a
sliding time window) or periodically (e.g. at the end of the time-slice over which total
bandwidth consumption is measured), depending on practical constraints.
This approach has the advantage of briefly favouring the lightweight ISP at the beginning
of the peak time period (because its recorded activity until then will typically be
comparatively low). It also includes the option of using different quotas for different
classes of ISP’s, which in turn creates an opportunity for offering “premium” packages
which are tailored to their customers’ usage profiles. In the present version of B-Cube,
when the “fair share” option is turned on, each ISP weight wi is calculated using
expression [1]:
§ 4kqi
2
·
wi max¨¨1, ¸
¸
[1]
© 4q i x i
2 2
¹
Where k is a constant and qi and xi are the agreed quota and recorded activity of ISP i
over the chosen time window, respectively. Of course, other functions, or even
completely different weighting procedures, could easily be implemented: this one is
nothing but a simple example, and only the output value is directly relevant to the
simulation.
Manuscript as submitted
Published with minor revisions in B.T. Tech. J. Vol. 23 No. 2 (April 2005) pp. 232-239
5 quota = 25 ("Bronze")
quota = 50 ("Gold")
4
Weight (k = 5)
0
0 25 50 75 100 125 150
Bandwidth consumed (arbitrary unit)
Fig. 3 shows the situation if ISP 2 accepts to buy a higher quota from the wholesale
provider (e.g. a “Gold” vs. “Bronze” package), in order to protect QoS for its customers.
The effect is partly illustrated by the appearance of a 24 hours period, because the
increased allowance for ISP 2 means that the peak time demand from its “Browsing” and
“Multimedia” users is now added to that of the “P2P” and “FTP” types, consuming up to
75% of the total bandwidth. This of course comes at the expense of ISP 1’s average QoS,
unless the wholesale provider invests some of its increased income into additional
capacity (i.e. lowering the contention ratio).
Manuscript as submitted
Published with minor revisions in B.T. Tech. J. Vol. 23 No. 2 (April 2005) pp. 232-239
§ kxi ·
wi max¨¨1, k ¸ [2]
© max( x1 , x 2 ,..., x n ) ¸¹
As shown on Fig. 5, this bandwidth allocation strategy not only improves average QoS
but also (perhaps more importantly) reduces inter-user variability even further, at no
apparent cost for any single category of end users. Our preferred explanation at this stage
is that this is because this form of prioritisation consistently favours lightweight users at
peak time yet doesn’t penalise their heavyweight counterparts by enforcing a “hard” cap
when this is unnecessary (i.e. they still have unfettered access to bandwidth whenever
available, including at peak time).
Fig. 5: “Silver” ISP package + “managed service” scenario (B-Cube interface screenshot)
5. Concluding remarks:
5.1 Other functionalities:
Section 4 offers only a glimpse into B-Cube’s capabilities. In the existing version, a
variety of other aspects of bandwidth management can already be explored, including but
not limited to:
x Other customer packages (1 or 2 Mbps, which can be combined with different
allowances when capping is applied)
x “Managed service” option at the wholesale level (i.e. applied to ISPs themselves)
Manuscript as submitted
Published with minor revisions in B.T. Tech. J. Vol. 23 No. 2 (April 2005) pp. 232-239
x Change in the behaviour or QoS evaluation criteria (currently limited to variable
“memory span”) of existing users
x Variable size of sliding time windows (allows for testing strategies that are more
or less responsive to temporary changes in individual usage patterns)
x Discrete vs. continuous priority updates
x Adjustable ISP-specific maximum ratio between highest and lowest priority
x Adjustable contention ratio at the wholesale level
In addition, the tool provides a number of “user friendly” features like the possibility of
turning statistics on or off, alternating between views plotting the bandwidth consumed
by an ISP against the available total and against its individual quota, saving or loading
scenarios etc.
5.2 Future developments:
As already mentioned, we are presently working on improving B-Cube by adding new
features or modifying existing elements like, e.g., the perceived QoS evaluation module.
However, more ambitious extensions are also under consideration for future work.
Among these is the development of a “policy builder” that would allow anyone using the
tool to specify a rule set for a completely new management strategy, whereas in the
prototype version, one is still limited to choose from a selection of predefined options and
parameter values. The ability to rapidly examine alternative strategies by defining their
high level behaviour is complemented by a range of increasingly powerful network
policing and shaping tools, Systems from suppliers such as Packeteer, P-Cube, Sandvine,
Ellacoya and Allot [8,9] permit intervention in network flows using a rich portfolio of
policies to control bandwidth availability for each of a user’s individual network flows
according to the type of traffic and their usage history. Even in the absence of these more
advanced tools, it is feasible to control headline rate and priority on a per-user basis using
simpler equipment already available in the network.
Furthermore, we wish to add the possibility of customising end user behaviour, in terms
of modelling fluctuations in typical bandwidth consumption over a 24 hours period. This
would allow for much finer modelling of subscribers’ activity patterns and expectations,
including any kind of “mixed” behaviour corresponding to a category of users who
alternate between profiles and applications, with the accompanying variations in QoS
requirements.
At present, B-Cube already provides a lightweight, user-friendly and intuitive simulation
tool to anyone who needs to understand and visualise the potential effect of bandwidth
management policy changes and/or of large-scale alterations to user behaviour (e.g. after
the launch of a new online “killer app”). After the suggested extensions are implemented,
we anticipate that B-Cube will also be capable of providing an accurate quantitative
measurement of perceived QoS, in the realistic context where each subscriber uses a
range of applications with variable bandwidth requirements.
6. References:
[1] http://bitconjurer.org/BitTorrent/
[2] www.tvoon.de/ctv/
Manuscript as submitted
Published with minor revisions in B.T. Tech. J. Vol. 23 No. 2 (April 2005) pp. 232-239
[3] http://downloads.lightreading.com/wplib/sandvine/meeting_the_
Challenge_of_P2P.pdf
[4] http://news.com.com/Microsoft+flip-flop+may+signal+blog+clog/2100-
1032_3-5368454.html
[5] http://www.sandvine.com/solutions/pdfs/spam_trojan_trend_analysis.pdf
[6] http://www.opnet.com/products/modeler
[7] G. S. Fishman (1996) “Monte Carlo, Concepts, Algorithms and Applications”,
Springer Verlag.
[8] http://www.lightreading.com/document.asp?doc_id=31901
[9] http://www.cabledatacomnews.com/mar03/mar03-2.html