DISCRETE-TIME ANALYSIS OF LEAKY-BUCKET CONGESTION CONTROL

被引:18
|
作者
WU, GL
MARK, JW
机构
[1] UNIV WATERLOO,DEPT ELECT & COMP ENGN,WATERLOO N2L 3G1,ONTARIO,CANADA
[2] UNIV WATERLOO,COMP COMMUN NETWORKS GRP,WATERLOO N2L 3G1,ONTARIO,CANADA
来源
COMPUTER NETWORKS AND ISDN SYSTEMS | 1993年 / 26卷 / 01期
基金
加拿大自然科学与工程研究理事会;
关键词
LEACKY BUCKET; CONGESTION CONTROL; QUEUING ANALYSIS; PERFORMANCE EVALUATION;
D O I
10.1016/0169-7552(93)90038-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traffic control at an ATM multiplexer is of fundamental importance in B-ISDN. Due to the presence of large propagation delay, effective traffic control tends to use only local information. Leaky bucket has been introduced as a rate control method. The present paper studies the system performance of a leaky bucket controller with the arrivals being Poisson processes or Markov modulated Poisson processes (MMPP). Numerical results indicate that a small to medium sized controller is sufficient to attain the capability of a leaky bucket controller; increasing the size of the controller wilt not offer much improvement in performance. Controlling MMPP type of arrivals with a leaky bucket device may incur low performance especially when the burst duration is long. The performance can be improved by controlling a group of bursty users instead of a single bursty user.
引用
收藏
页码:79 / 94
页数:16
相关论文
共 50 条
  • [1] PERFORMANCE ANALYSIS OF A LEAKY-BUCKET CONTROLLED ATM MULTIPLEXER
    REN, JF
    MARK, JW
    WONG, JW
    PERFORMANCE EVALUATION, 1994, 19 (01) : 73 - 101
  • [2] Leaky-Bucket shaper design based on Time Interval Grouping
    Orphanoudakis, TG
    Charopoulos, CN
    Leligou, HC
    IEEE COMMUNICATIONS LETTERS, 2005, 9 (06) : 573 - 575
  • [3] Discrete-time analysis of the leaky bucket scheme with threshold-based token generation intervals
    Choi, BD
    Choi, DI
    IEE PROCEEDINGS-COMMUNICATIONS, 1996, 143 (02): : 105 - 111
  • [4] A scalable architecture for fair leaky-bucket shaping
    Rexford, J
    Bonomi, F
    Greenberg, A
    Wong, A
    IEEE INFOCOM '97 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, PROCEEDINGS, VOLS 1-3: SIXTEENTH ANNUAL JOINT CONFERENCE OF THE IEEE COMPUTER AND COMMUNICATIONS SOCIETIES - DRIVING THE INFORMATION REVOLUTION, 1997, : 1054 - 1062
  • [6] Performance analysis of leaky-bucket bandwidth enforcement algorithm in ATM networks
    Guanghong, Lu
    High Technology Letters, 1997, 3 (01): : 54 - 58
  • [7] Video compression with output traffic conforming to leaky-bucket network access control
    Li, N
    Liew, SC
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL II, 1996, : 441 - 444
  • [8] Performance analysis of leaky-bucket controlled Pareto-distributed on/off sources
    Wong, TC
    Mark, JW
    Chua, KC
    Chew, YH
    ICICS-PCM 2003, VOLS 1-3, PROCEEDINGS, 2003, : 1685 - 1696
  • [9] Leaky-bucket based rate control algorithm for C_VBR video encoding
    Bai, JF
    Liao, QM
    Lin, XG
    ELECTRONICS LETTERS, 1999, 35 (18) : 1529 - 1530