call admission control
DESCRIPTION
Call Admission Control. Carey Williamson. Department of Computer Science University of Calgary. The CAC Function: Everything you ever wanted to know but were afraid to ask. Carey Williamson. Department of Computer Science University of Saskatchewan. Introduction. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/1.jpg)
1
Call Admission Control
Carey Williamson
Department of Computer ScienceUniversity of Calgary
![Page 2: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/2.jpg)
2
The CAC Function:Everything you ever wanted to
know but were afraid to ask
Carey Williamson
Department of Computer ScienceUniversity of Saskatchewan
![Page 3: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/3.jpg)
3
Introduction
The purpose of an admission control algorithm is to decide, at the time of call arrival, whether or not a new call should be admitted into the network
A new call is admitted if and only if its Quality of Service (QOS) constraints can be satisfied without jeapordizing the QOS constraints of existing calls in the network
![Page 4: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/4.jpg)
4
Call Admission Control
Admission control decision is made using a traffic descriptor that specifies traffic characteristics and QOS requirements
Traffic characteristics:– peak cell rate (PCR), sustained cell rate (SCR),
maximum burst size (MBS),... QOS requirements:
– tolerable cell loss, cell delay, delay variation
![Page 5: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/5.jpg)
5
Issues
Want to make efficient use of the network (i.e., accommodate as many calls as possible, and maintain a reasonably high level of network utilization)
Want to guarantee quality of service for all calls that get into the network
Tradeoff: can’t always have both!
![Page 6: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/6.jpg)
6
Why is it Difficult?
ATM is completely based on the idea of statistical multiplexing of VBR sources
No assignment of specific slots to users, but statistical assignment of capacity based on expected traffic characteristics
Providing guarantees requires conservatism High utilization requires aggressiveness
![Page 7: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/7.jpg)
7
Why is it Difficult? (Cont’d)
Typical traffic sources are bursty Some traffic sources are VERY bursty Traffic can be highly unpredictable Accurate traffic descriptors may not be
known in advance Traffic may not conform to its descriptor
![Page 8: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/8.jpg)
LeastUnderstood
MostUnderstood
Traffic Characterization
![Page 9: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/9.jpg)
LeastUnderstood
MostUnderstood
Voice
Traffic Characterization
![Page 10: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/10.jpg)
LeastUnderstood
MostUnderstood
VoiceCBRvideo
Traffic Characterization
![Page 11: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/11.jpg)
LeastUnderstood
MostUnderstood
VoiceCBRvideo
Packetdata
Traffic Characterization
![Page 12: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/12.jpg)
LeastUnderstood
MostUnderstood
VoiceCBRvideo
Packetdata
Traffic Characterization
Image
![Page 13: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/13.jpg)
LeastUnderstood
MostUnderstood
VoiceCBRvideo
Packetdata
Image
VBRvideo
Traffic Characterization
![Page 14: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/14.jpg)
14
Multiplexing
Two basic approaches Deterministic multiplexing Statistical multiplexing
![Page 15: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/15.jpg)
15
Deterministic Multiplexing
The traditional means of bandwidth allocation in telecommunications networks
Each traffic type has an inherent bit rate (e.g., voice traffic = 64 kilobits per second)
Allocate precisely that bandwidth for each call, for the duration of the call
![Page 16: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/16.jpg)
16
Deterministic Multiplexing (Cont’d)
Advantages:– Simple– Works great for CBR traffic (PCR = SCR)
Disadvantages:– Inefficient for VBR traffic (PCR !=SCR)
Allocating PCR can waste lots of capacity
![Page 17: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/17.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
Source 1: peak 12 Mbps,mean 8 Mbps
![Page 18: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/18.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
12 Mbps
![Page 19: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/19.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
Source 2:peak 10 Mbps,mean 6 Mbps
![Page 20: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/20.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
22 Mbps(12 + 10)
![Page 21: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/21.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
22 Mbps(12 + 10)
Average utilizationwill be 14/22 = 64%
![Page 22: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/22.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
Bit
ra
te
![Page 23: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/23.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
Bit
ra
te
![Page 24: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/24.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
Bit
ra
te
![Page 25: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/25.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
Bit
ra
te
![Page 26: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/26.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
Bit
ra
te
![Page 27: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/27.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
Bit
ra
te
![Page 28: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/28.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
Bit
ra
te
![Page 29: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/29.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
Bit
ra
te
![Page 30: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/30.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
Bit
ra
te
![Page 31: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/31.jpg)
Deterministic versus Statistical Multiplexing
Bit
rate
Bit
ra
te
Bandwidth savingwith StatisticalMultiplexing
![Page 32: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/32.jpg)
32
Statistical Multiplexing
Basic idea: ‘‘pack in’’ more than would be able to fit with deterministic multiplexing
Takes advantage of the variable bit rate bursty nature of traffic
Not all traffic sources will need their peak rate at the same time (hopefully)
Peaks and valleys should balance out
![Page 33: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/33.jpg)
33
Statistical Multiplexing (Cont’d)
Advantages:– More calls can fit in the network– Increases utilization, efficiency of network– Statistical gain can be significant
Disadvantages:– QOS is hard to guarantee (100% guarantee)
Always an element of risk, however slight
![Page 34: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/34.jpg)
34
Simple CAC Schemes
int CAC_Function(TrafficDescriptor *TD)
{
return( YES );
}
![Page 35: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/35.jpg)
35
Simple CAC Schemes
int CAC_Function(TrafficDescriptor *TD)
{
return( YES );
}
![Page 36: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/36.jpg)
36
Simple CAC Schemes (Cont’d)
int CAC_Function(TrafficDescriptor *TD)
{
return( NO );
}
![Page 37: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/37.jpg)
37
Simple CAC Schemes (Cont’d)
int CAC_Function(TrafficDescriptor *TD)
{
return( NO );
}
![Page 38: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/38.jpg)
38
Possible CAC Schemes
Peak rate allocation Mean rate allocation (Peak + Mean) / 2 Virtual Bandwidth [Murase 90] Schedulable Region [Lazar 91] Effective Bandwidth [Elwalid 93]
![Page 39: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/39.jpg)
39
Peak Rate Allocation
Allocate the peak cell rate for the source Same as Deterministic Multiplexing Guarantees that no cell loss occurs Guarantees that bandwidth is wasted if
source is at all bursty (peak > mean) The amount of wasted bandwidth depends
on the peak-to-mean ratio
![Page 40: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/40.jpg)
40
Mean Rate Allocation
Allocate bandwidth based on the mean rate (SCR)
By definition, this is adequate over a long enough time duration
Drawback is the delay for traffic bursts May not be enough capacity to handle
bursts within a tolerable delay
![Page 41: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/41.jpg)
41
(Peak + Mean) / 2
Peak rate is the most that is needed Mean rate is the least that is needed ‘‘Correct’’ allocation must be in between But where is the real question! (Peak + Mean) / 2 is one guess Suitability depends on characteristics of
source (e.g., time spent at or near each)
![Page 42: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/42.jpg)
42
Can you do better?
Of course! Effective Bandwidth: [Elwalid 93] Virtual Bandwidth: [Murase 90] Schedulable Region: [Lazar 91] We’ll look at some of these in more detail
in just a moment...
![Page 43: Call Admission Control](https://reader036.vdocuments.mx/reader036/viewer/2022062408/56813b16550346895da3c573/html5/thumbnails/43.jpg)
43
Summary
Call Admission Control is one of the most difficult problems to deal with in ATM networks
Difficult problem, no standard solution Lots of research activity Impossible to find a single ‘‘best’’ answer