Analysis of a self-similar traffic envelope for a trade-off of leaky bucket algorithm parameters
نویسندگان
چکیده
Numerous investigations have revealed that the packet network traffic is bursty and highly correlated. If many large bursts meet in a single queue an overflow is unavoidable even for a slightly loaded network, therefore shaping packet traffic becomes a crucial issue. One of the most commonly used traffic shaping algorithms is a leaky bucket. An important property of a leaky bucket algorithm is that one can find different pairs of leaky bucket parameters (r, b) for the same drop probability pd. The burstiness curve binds leaky bucket parameters (r, b) for the fixed drop probability pd. The basic goal of the analysis presented in the dissertation is computing a burstiness curve for the FARIMA traffic model with support of original results obtained for its envelope analysis; an FGN model has been used as a reference. The motivation for finding the burstiness curve is that trading r and b values for the same pd yields in changing traffic parameters without changing QoS. The reason for choosing the FARIMA model is that the FARIMA process can exhibit SRD and LRD structures independently and simultaneously and a distribution of a FARIMA process is known. The obtained results have been confirmed by a simulation study. An additional achievement of this dissertation is derivation of an envelope process for the three types of FARIMA models.
منابع مشابه
Performance Analysis of Leaky-Bucket Controlled Pareto-Distributed On/Off Sources
An approximate performance analysis of a leaky bucket with Pareto-distributed On/Off sources is presented. The aggregate of Pareto-distributed On/Off sources is a self-similar traffic. This analysis is applicable to the leaky bucket policing device at the ingresses of (1) a base station in a Wireless ATM network, (2) a wireline ATM network, and (3) future generations of IP-based networks with q...
متن کاملBuffered and Unbuffered Leaky Bucket Policing: Guaranteeing QoS, Design and Admission Control
Traffic shaping and smoothing using buffers or leaky buckets does not necessarily improve Quality of Service (QoS). In fact there is a trade-off between controlling user traffic and guaranteeing QoS to the users. We consider the first two stages (source node and border node before entering a network cloud) of an end-to-end QoS problem and assume that the QoS requirements across each of the two ...
متن کاملPerformance Optimization of ATM Input Control using an Adaptive Leaky-Bucket Mechanism
This paper investigates a combined reactive/preventive congestion control mechanism. Emphasis is given to optimize the Leaky Bucket (LB) mechanism chosen for source traffic policing in ATM networks, examining performance characteristics such as reaction time, cell loss and cell delay. The performance of both buffered and unbuffered LBs is analyzed using the fluid-flow model. Closed form formula...
متن کاملApproximation of Loss Probability for Multiplexing System with Large Number of On-off Sources Regulated by Leaky Bucket
This paper considers the loss probability of the multiplexing system with the large size of the buffer and the large number of homogeneous ON-OFF sources. We model the multiplexing system as the fluid queueing system with the regulated input fluid traffic. Each traffic generated by an ON-OFF source (original traffic) is regulated by the leaky bucket and aggregated output traffic (regulated traf...
متن کاملA Minimum Output Burstiness Traffic Scheduling Algorithm
In this paper, we present a traffic scheduling algorithm, called the Delay-Bound Monotonic with Average Rate Reservation (DM/ARR), which generates minimum output burstiness streams. We assume that connection i is policed by the leaky bucket algorithm with parameters (σi, ρi) where σi is the bucket size (or burstiness) and ρi is the leaky rate. Compared with the totally isolated scheme where con...
متن کامل