A Packet Class-Based Scheme for Providing Throughput Guarantees to TCP Flows

  • Lluís Fàbrega
  • Teodor Jové
  • Pere Vilà
  • José Marzo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3751)


TCP flows generated by applications such as the web or ftp require a minimum network throughput to satisfy users. To build this service, we propose a scheme with Admission Control (AC) using a small set of packet classes in a core-stateless network. At the ingress each flow packet is marked as one of the set of classes, and within the network, each class is assigned a different discarding priority. The AC method is based on edge-to-edge per-flow measurements, and it requires flows to be sent at a minimum rate. The scheme is able to provide different throughput to different flows and protection against non-responsive sources. We evaluate the scheme through simulation in several network topologies with different traffic loads consisting of TCP flows that carry files of varying sizes. In the simulation, TCP uses a new algorithm to keep the short-term sending rate above a minimum value. The results prove that the scheme guarantees the throughput to accepted flows and achieves high utilization of resources, similar to the ideal results of a classical hop-by-hop AC.


Label Switch Path Logical Path Minimum Throughput Flow Packet Elastic Flow 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Brownlee, N., Claffy, K. C.: Understanding Internet Traffic Streams: Dragonflies and Tortoises. IEEE Communications Magazine (2002) Google Scholar
  2. 2.
    Jacobson, V.: Congestion Avoidance and Control. ACM Computer Communication Review (1998) Google Scholar
  3. 3.
    Roberts, J. W., Massoulié, L.: Arguments in Favour of Admission Control for TCP flows. In: 16th ITC (1999) Google Scholar
  4. 4.
    Fàbrega, L.l., Jové, T., Donoso, Y.: Throughput Guarantees for Elastic Flows using End-to end Admission Control. IFIP/ACM LANC (2003) Google Scholar
  5. 5.
    Clark, D. D., Fang, W.: Explicit Allocation of Best-effort Packet Delivery Service. IEEE/ACM Transactions on Networking (1998) Google Scholar
  6. 6.
    Blake, S., Black, D., Carlson, M., Davies, E., Weiss, W., Wang, Z.: An Architecture for Differentiated Services. RFC 2475 (1998) Google Scholar
  7. 7.
    Mortier, R., Pratt, I., Clark, C., Crosby, S.: Implicit Admission Control. IEEE Journal on Selected Areas in Communications (2000) Google Scholar
  8. 8.
    Kumar, A., Hegde, M., Anand, S.V.R., Bindu, B.N., Thirumurthy, D., Kherani, A.A.: Nonintrusive TCP Connection Admission Control for Bandwidth Management of an Internet Access Link. IEEE Communications Magazine (2000) Google Scholar
  9. 9.
    Fredj, S. B., Oueslati-Boulahia, S., Roberts, J.W.: Measurement-based Admission Control for Elastic Traffic. ITC 17 (2001) Google Scholar
  10. 10.
    Bianchi, G., Capone, A., Petrioli, C.: Throughput Analysis of End-to-end Measurementbased Admission Control in IP. INFOCOM (2000) Google Scholar
  11. 11.
    Breslau, L., Knightly, E., Shenker, S., Stoica, I., Zhang, H.: Endpoint Admission Control: Architectural Issues and Performance. In: ACM SIGCOMM (2000) Google Scholar
  12. 12.
    Rosen, E., Viswanathan, A., Callon, R.: Multiprotocol Label Switching Architecture. RFC 3031 (2001) Google Scholar
  13. 13.
    UCB/LBL/VINT Network Simulator – ns (version 2),
  14. 14.
    Fredj, S. B., Bonald, T., Proutière, A., Régnié, G., Roberts, J.W.: Statistical Bandwidth Sharing: a Study of Congestion at Flow Level. In: ACM SIGCOMM (2001) Google Scholar
  15. 15.
    Law, A.M., Kelton, W.D.: Simulation Modelling and Analysis. MacGraw-Hill, New York (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Lluís Fàbrega
    • 1
  • Teodor Jové
    • 1
  • Pere Vilà
    • 1
  • José Marzo
    • 1
  1. 1.Institute of Informatics and Applications (IIiA)University of GironaGironaSpain

Personalised recommendations