Analytical methods for resource allocation and admission control with Dual-Leaky-Bucket regulated traffic

被引:4
|
作者
Giacomazzi, Paolo [1 ]
Musumeci, Luigi [1 ]
Saddemi, Gabriella [1 ]
Verticale, Giacomo [1 ]
机构
[1] Politecn Milan, DEI, I-20133 Milan, Italy
关键词
D O I
10.1109/ICC.2007.88
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we study the problems of resource allocation and admission control of traffic flows with guaranteed Quality of Service. Specifically, we deal with traffic flows regulated by Dual-Leaky Buckets and we establish the analytical expressions for (a) the minimum capacity to be allocated in order to guarantee the required delay performance and for (b) the maximum number of flows that is possible to accept, known the link capacity, with statistical QoS constraints on the delay. With the closed-form formulae obtained with our analysis, we compare the performance of the Dual-Leaky-Bucket and of the simpler Token-Bucket regulators, and we discuss the conditions that make the Dual-Leaky Bucket outperform the Token Bucket.
引用
收藏
页码:499 / 505
页数:7
相关论文
共 50 条
  • [1] Admission control of leaky bucket regulated sources in a queueing system with priority
    Dumas, V
    Guillemin, F
    Robert, P
    PROVIDING QUALITY OF SERVICE IN HETEROGENEOUS ENVIRONMENTS, VOLS 5A AND 5B, 2003, 5A-B : 1141 - 1150
  • [2] Minimum-latency dual-leaky-bucket shapers for packet multiplexers: Theory and implementation
    Francini, A
    Chiussi, FM
    IEEE 2000 EIGHTH INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2000, : 19 - 28
  • [3] Optimal resource allocation and leaky bucket based power control for CBR MIMO systems
    Luo, WJ
    Jeyaraj, A
    El Zarki, M
    CONFERENCE PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE, 2005, : 561 - 566
  • [4] PERFORMANCE LIMITATION OF LEAKY BUCKET ALGORITHM FOR USAGE PARAMETER CONTROL AND BANDWIDTH ALLOCATION METHODS
    YAMANAKA, N
    SATO, Y
    SATO, K
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1992, E75B (02) : 82 - 86
  • [5] Generalized Processor Sharing under Leaky-Bucket regulated traffic
    Wang, XY
    Azizoglu, M
    CIC'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN COMPUTING, 2001, : 105 - 112
  • [6] A dual level leaky bucket traffic shaper architecture for DiffServ networks
    Zeng, SR
    Uzun, N
    Papavassiliou, S
    2001 IEEE WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING, 2001, : 73 - 77
  • [7] A Real Time Leaky Bucket Based Admission Control Scheme for VoIP Networks
    Alwakeel, Sami S.
    AlGhanmi, Shaker S.
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 651 - 656
  • [8] Buffered and unbuffered leaky bucket policing: Guaranteeing QoS, design and admission control
    Gautam, N
    TELECOMMUNICATION SYSTEMS, 2002, 21 (01) : 35 - 63
  • [9] Buffered and Unbuffered Leaky Bucket Policing: Guaranteeing QoS, Design and Admission Control
    Natarajan Gautam
    Telecommunication Systems, 2002, 21 : 35 - 63
  • [10] Admission control and resource allocation for DS-CDMA networks with multiple traffic classes
    Chen, RR
    Madhow, U
    2000 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2000, : 469 - 469