14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services

Research Article

Towards an Analysis of Traffic Shaping and Poliing in Fog Networks Using Stochastic Fluid Models

  • @INPROCEEDINGS{10.4108/eai.7-11-2017.2273907,
        author={Jiaojiao Jiang and Longxiang Gao and Jiong Jin and Tom Luan and Shui Yu and Dong Yuan and Yong Xiang and Dongfeng Yuan},
        title={Towards an Analysis of Traffic Shaping and Poliing in Fog Networks Using Stochastic Fluid Models},
        proceedings={14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services},
        publisher={ACM},
        proceedings_a={MOBIQUITOUS},
        year={2018},
        month={4},
        keywords={fog computing energy model},
        doi={10.4108/eai.7-11-2017.2273907}
    }
    
  • Jiaojiao Jiang
    Longxiang Gao
    Jiong Jin
    Tom Luan
    Shui Yu
    Dong Yuan
    Yong Xiang
    Dongfeng Yuan
    Year: 2018
    Towards an Analysis of Traffic Shaping and Poliing in Fog Networks Using Stochastic Fluid Models
    MOBIQUITOUS
    ACM
    DOI: 10.4108/eai.7-11-2017.2273907
Jiaojiao Jiang1, Longxiang Gao2,*, Jiong Jin1, Tom Luan3, Shui Yu4, Dong Yuan5, Yong Xiang4, Dongfeng Yuan6
  • 1: Swinburne University of Technology, Australia
  • 2: Deakin University, Australia
  • 3: Xidian Univeristy, China
  • 4: Deakin Univeristy, Australia
  • 5: University of Sydney
  • 6: Shandong Univeristy, China
*Contact email: longx@deakin.edu.au

Abstract

This paper gives models and analytic techniques for studying shaping and policing data traffic in fog networks. The traffic in these networks is expected to be highly diverse and bursty, and regulation will be required as an integral part of congestion control. We generalize the Leaky Bucket model to shape and police traffic source for rate-based congestion control in high-speed fog networks. In particular, the Markov modulated fluid sources reflect the bursty characteristics of data traffic. To measure the performance of the model in shaping and policing traffic, we derive four performance metrics. The experimental results show that with proper design the Leaky Bucket model effectively controls a 4-way trade-off between throughput, loss probability, delay and burstiness of data traffic. Numerical results also reveal that the model performance is sensitive to certain traffic source characteristics.