DOI QR코드

DOI QR Code

PERFORMANCE ANALYSIS OF THE LEAKY BUCKET SCHEME WITH QUEUE LENGTH DEPENDENT ARRIVAL RATES

  • Choi, Doo-Il (Department of Applied Mathematics, Halla University) ;
  • Lee, Sang-Min (Department of Industrial Engineering, KAIST)
  • Published : 2006.08.01

Abstract

In this paper, we analyze a leaky bucket (LB) scheme with queue length dependent arrival rates. In other words, if the queue length exceeds an appropriate threshold value on buffer, the arrivals need to be controlled. In ATM networks, if the congestion occurs, the input traffics must be controlled (reduced) for congestion resolution. By the bursty and correlated properties of traffics, the arrivals are assumed to follow a Markov-modulated Poisson process (MMPP). We derive the loss probability and the waiting time distribution for arbitrary cell. The analysis is done by using the embedded Markov chain and supplementary variable method. We also present some numerical examples to show the effects of our proposed LB scheme.

Keywords

References

  1. H. Ahmadi, R. Guerin, and K. Sohraby, Analysis of leaky bucket access control mechanism with batch arrival process, IEEE Globecom'90 (1990), 344-349
  2. M. Butto, E. Cavallero, and A. Tonietti, Effectiveness of the leaky bucket policing mechanism in ATM networks, IEEE J. Sel. Areas Commun. 9 (1991), no. 3, 335-342 https://doi.org/10.1109/49.76631
  3. B. D. Choi and D. I. Choi, Discrete-time analysis of the leaky bucket scheme with threshold-based token generation intervals, IEE Proc. Commun. 143 (1996), 105-111
  4. B. D. Choi and D. I. Choi, The discrete-time analysis of the leaky bucket scheme with dynamic leacky rate control, Comm. Korean. Math. Soc. 13 (1998), no. 3, 603-627
  5. D. I. Choi, B. D. Choi, and D. K. Sung, Performance analysis of priority leaky bucket scheme with queue-length-threshold scheduling policy, IEE Proc. Commun. 145 (1998), no. 6, 395-401
  6. Y. H. Kim, B. C. Shin, and C. K. Un, Performance analysis of leaky bucket band-width enforcement strategy for bursty traffics in an ATM networks, Computer Networks ISDN Syst. 25(1992), 295-303 https://doi.org/10.1016/0169-7552(92)90096-9
  7. J. Y. Lee and C. K. Un, Performance of dynamic rate leaky bucket algorithm, IEE Electron. Lett. 29 (1993), no. 17, 1560-1561 https://doi.org/10.1049/el:19931040
  8. C. G. Park, B. D. Choi, and D. K. Sung, Performance analysis of leaky bucket scheme with a threshold in the data buffer, Computer Networks ISDN Syst. 29 (1997), 781-795 https://doi.org/10.1016/S0169-7552(96)00104-3
  9. M. Sidi, Z. Lin, I. Cidon, and I. Gopal, Congestion control through input rate regulation, Proceedings of IEEE Globecom'89 ( 1989)
  10. K. Sohraby and M. Sidi, On the performance of bursty and modulated sources subject to leaky bucket rate based access control schemes, IEEE Trans. on Commun. 42 (1994), 477-487 https://doi.org/10.1109/TCOMM.1994.577075
  11. J. Tunner, New directions in communications(or Which way to the information age), IEEE Communi. Mag. 24 (1986), 17-24
  12. G. L. Wu and J. W. Mark, Discrete time analysis of leaky bucket congestion control, Computer Networks ISDN Syst. 26 (1993), 79-94 https://doi.org/10.1016/0169-7552(93)90038-6
  13. J. Zeng and L. F. Merakos, Analysis of a priority leaky bucket regulator for virtual path traffic in ATM networks, Proceedings of IEEE Globecom'94. 1994, 606-611

Cited by

  1. QUEUEING ANALYSIS FOR TRAFFIC CONTROL WITH COMBINED CONTROL OF DYNAMIC MMPP ARRIVALS AND TOKEN RATES vol.17, pp.2, 2013, https://doi.org/10.12941/jksiam.2013.17.103