01.07.2013 Views

Th`ese de Doctorat de l'université Paris VI Pierre et Marie Curie Mlle ...

Th`ese de Doctorat de l'université Paris VI Pierre et Marie Curie Mlle ...

Th`ese de Doctorat de l'université Paris VI Pierre et Marie Curie Mlle ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

(CSTtable) is updated by the ingress router (IngressRouter).<br />

• At this phase, we distinguish b<strong>et</strong>ween the four bandwidth allocation algorithms<br />

(SDBA, IDBA, OBA and IBA).<br />

– SDBA takes as input the updated CST table, the LinksTable table and the<br />

routing matrix, and then outputs the bandwidth allocations associated to the<br />

connections listed in the CST table. The bandwidth allocation values calculated<br />

by SDBA are communicated to token buck<strong>et</strong>s installed at ingress routers to<br />

regulate the sources’ sending rate.<br />

Note that, Table A.1 has shown a general case for updating the CST table tak-<br />

ing into account the connections’ offered rate. These latters are not consi<strong>de</strong>red<br />

during SDBA execution, differently from IDBA presented hereafter.<br />

– IDBA iterates over SDBA consi<strong>de</strong>ring also the connections’ offered rates that<br />

are updated (see Table A.2), in the previous phase, based on the measurements<br />

performed by the traffic monitors. We recall that with IDBA a connection can-<br />

not be assigned a bandwidth higher than its offered rate. Thus, IDBA can<br />

exploit more efficiently n<strong>et</strong>work resources achieving further gains than SDBA,<br />

in terms of n<strong>et</strong>work revenue.<br />

– OBA is implemented by exploiting the important feature of Java that allows to<br />

call external programs during execution. OBA takes all the inputs consi<strong>de</strong>red<br />

by IDBA, as well as some s<strong>et</strong>ting param<strong>et</strong>ers and translates all these to an<br />

environment comprehensible by AMPL.<br />

At this stage, AMPL is called by OBA through an external program using the<br />

Java m<strong>et</strong>hod g<strong>et</strong>Runtime().exec(String[]). Table A.3 explains in some <strong>de</strong>tail how<br />

AMPL is called by OBA.java, which is the Java class that implements OBA.<br />

99

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!