Rate-based and gap-based available bandwidth estimation techniques in cross-traffic context

Wayman Tan, Marat Zhanikeev, Yoshiaki Tanaka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Recent years have seen an increasing interest in end-to-end available bandwidth estimation. A number of estimation techniques and tools have been developed during the last few years. All of them can be classified into two models: rate-based and gap-based, according to the underlying approaches. The difference in characteristics of both models is studied in this paper. PathChirp and ICI are selected to represent each model and they are evaluated on low speed paths which are typical in today's local access of the Internet. Finally a hybrid method adopting both rate-based and gap-based approaches is proposed. The hybrid method is compared with pathChirp and IGI. Simulation proves that the hybrid method yields more accurate results and reduces overhead traffic.

Original languageEnglish
Title of host publicationManagement of Convergence Networks and Services - 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006, Proceedings
PublisherSpringer Verlag
Pages73-81
Number of pages9
ISBN (Print)3540457763, 9783540457763
DOIs
Publication statusPublished - 2006 Jan 1
Event9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006 - Busan, Korea, Republic of
Duration: 2006 Sep 272006 Sep 29

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4238 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006
CountryKorea, Republic of
CityBusan
Period06/9/2706/9/29

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Rate-based and gap-based available bandwidth estimation techniques in cross-traffic context'. Together they form a unique fingerprint.

Cite this