Traffic analysis for QoS provisioning in Bluetooth ad hoc network

Traffic from real-time and multimedia interactive applications are known to be bursty. With this behavior, they are said to associate with self-similar property, by which they can no longer be expressed as Poisson distribution, but following power law distribution such as Pareto. Bursty traffic has...

Full description

Saved in:
Bibliographic Details
Main Authors: H., Hasbullah, S., Sulaiman, A.Md., Said
Format: Conference or Workshop Item
Published: 2008
Subjects:
Online Access:http://eprints.utp.edu.my/154/1/paper.pdf
http://www.scopus.com/inward/record.url?eid=2-s2.0-58149186106&partnerID=40&md5=0a8fceb6b54e50faa563f2e9d1b7f507
http://eprints.utp.edu.my/154/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Petronas
Description
Summary:Traffic from real-time and multimedia interactive applications are known to be bursty. With this behavior, they are said to associate with self-similar property, by which they can no longer be expressed as Poisson distribution, but following power law distribution such as Pareto. Bursty traffic has a direct impact on network performance. Thus, if the self-similar property can be captured at earlier stage before submission to network, a specific mechanism could be applied at a sender node such that a more regulated traffic could be obtained. As a result, deterministic network performance could be attained, and thus allowing QoS guarantees be granted to users. However, this can only be effectively done with support of a source traffic analysis. Hence, the objectives of this paper are two folds: first is to identify the reason for burstiness, and second is to determine if the self-similar property can be removed from the source traffic. By executing these two, a traffic analysis shall be produced. Video traces of Jurassic Park and Soccer were simulated in a Bluetooth ad hoc network environment and were checked against a set of criteria for self-similarity. It was found that, in the first place, self-similar behavior is indeed associated with bursty traffic. Secondly, the number of packets produced from SAR segmentation protocol is the reason for the heavy-tailed distribution of the source traffic. Finally, the SAR protocol was found unable to eliminate the self-similar property from a bursty traffic flow. ©2007 IEEE.