preview

A Real Time Leaky Bucket Based Admission Control Scheme For Voip Networks

Better Essays

A Real Time Leaky Bucket Based Admission Control Scheme for VoIP Networks Seminar Report Submitted By Arunima Goel Reg. No: 130907620 Section: B2 Department of Electronics and Communication Engineering MANIPAL INSTITUTE OF TECHNOLOGY (A Constituent Institute of Manipal University) MANIPAL-576 104 August 2016 INDEX SR. NO. TOPIC PAGE NO. 1. Introduction 3 2. Leaky Bucket Algorithm 3 3. Call Admission Control(CAC) 4 4. The RLB-CAC Technique 4 5. Transforming LB into a rate tester 5 6. Conclusion 7 7. References 8 1. INTRODUCTION A significant amount of research efforts have been directed towards attempts at providing high quality service for real time applications of IP based networks in the past decade. The core idea of these techniques is to control the IP network congestion level which is the main cause of delays/losses, and also imposes upper bounds on these events. Traffic policing is one of the techniques used for this purpose. These techniques makes the assumption that users generating flows/calls will specify the setup time by using Service Level Agreement (SLAs) i.e. the characteristics of the traffic that they emit to the network. Therefore, these techniques are employed to ensure that the generated traffic is within the conforms of previously agreed contracts. One of the most popular traditional traffic policing techniques is the Leaky Bucket (LB). Average rate and the maximum burst size/length of a

Get Access