On the Performance of Bursty and Correlated Sources Subject to Leaky Bucket Rate-Based Access Control Schemes

نویسندگان

  • Khosrow Sohraby
  • Moshe Sidi
چکیده

| In this paper we provide the analysis of a rate-based access control scheme in high speed environments based on a buuered leaky bucket algorithm. The analysis is carried out in discrete time which is representative of an ATM environment. For the cell arrivals to the leaky bucket we consider a general discrete Markovian arrival process which models bursty and modulated sources. The key of our analysis is the introduction of the deecit function that allows the reduction of the original problem to a more standard discrete time queueing system with the same arrival process. As an important special case, the detailed analysis of the Binary Markov Source throttled by such rate-based access control schemes is presented. Along with explicit re-cursions for computation of state probabilities and simple characterization of the asymptotic behavior of the queue build up, some guidelines for the parameter selection of these schemes are provided. Our results indicate that for sources with relatively large active periods, for an acceptable grade-of-service at the input queue, the token generation rate should be chosen to be close to the peak rate of the source, and increasing the bucket size of the leaky bucket does not improve substantially the performance at the input queue.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Flexible Traffic Shaper for High Speed Networks: Design and Comparative Study with Leaky Bucket

Maximizing bandwidth utilization and providing performance guarantees, in the context of multimedia networking, are two incompatible goals. Heterogeneity of the multimedia sources calls for eeective traac control schemes to satisfy their diverse Quality of Service(QoS) requirements. These include admission control at connection set up, traac control at the source ends and eecient scheduling sch...

متن کامل

Performance Analysis of Leaky-Bucket Controlled Pareto-Distributed On/Off Sources

An approximate performance analysis of a leaky bucket with Pareto-distributed On/Off sources is presented. The aggregate of Pareto-distributed On/Off sources is a self-similar traffic. This analysis is applicable to the leaky bucket policing device at the ingresses of (1) a base station in a Wireless ATM network, (2) a wireline ATM network, and (3) future generations of IP-based networks with q...

متن کامل

An Adaptive Fuzzy Control Double Leaky Bucket Using Backoff Time and Backpressure in Policing Mechanism Schemes over VDSL Network17 An Adaptive Fuzzy Control Double Leaky Bucket Using Backoff Time and Backpressure in Policing Mechanism Schemes over VDSL Network

When congestion occurs in VDSL networks, it will drop incoming frames because the buffer fills up frames until it overflows. In backpressure algorithm suitable for low traffic [1], it prevents buffer overflows. In backoff time in leaky bucket over traffic policing mechanism suitable for high traffic [2], Backoff time computations are wildly used in order to avoid the impact on the network perfo...

متن کامل

Performance Analysis of the Leaky Bucket Scheme with Queue Length Dependent Arrival Rates

In this paper, we analyze a leaky bucket (LB) scheme with queue length dependent arrival rates. In other words, if the queue length exceeds an appropriate threshold value on buffer, the arrivals need to be controlled. In ATM networks, if the congestion occurs, the input traffics must be controlled (reduced) for congestion resolution. By the bursty and correlated properties of traffics, the arri...

متن کامل

Spectral Analysis of Access Rate Control in High Speed Networks

In this paper we study the performance trade-oo of access rate control in high speed networks by spectral analysis. The emphasis is placed on the interrelationship between access control queueing and network queueing, as aaected by degrees of control in response to diiering input power spectrum. Both deterministic and stochastic analyses are developed. While the simple deterministic analysis he...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1991