Browse > Article
http://dx.doi.org/10.4134/BKMS.2006.43.3.657

PERFORMANCE ANALYSIS OF THE LEAKY BUCKET SCHEME WITH QUEUE LENGTH DEPENDENT ARRIVAL RATES  

Choi, Doo-Il (Department of Applied Mathematics, Halla University)
Lee, Sang-Min (Department of Industrial Engineering, KAIST)
Publication Information
Bulletin of the Korean Mathematical Society / v.43, no.3, 2006 , pp. 657-669 More about this Journal
Abstract
In this paper, we analyze a leaky bucket (LB) scheme with queue length dependent arrival rates. In other words, if the queue length exceeds an appropriate threshold value on buffer, the arrivals need to be controlled. In ATM networks, if the congestion occurs, the input traffics must be controlled (reduced) for congestion resolution. By the bursty and correlated properties of traffics, the arrivals are assumed to follow a Markov-modulated Poisson process (MMPP). We derive the loss probability and the waiting time distribution for arbitrary cell. The analysis is done by using the embedded Markov chain and supplementary variable method. We also present some numerical examples to show the effects of our proposed LB scheme.
Keywords
queueing analysis; leaky bucket; MMPP; telecommunication networks;
Citations & Related Records

Times Cited By SCOPUS : 1
연도 인용수 순위
1 M. Butto, E. Cavallero, and A. Tonietti, Effectiveness of the leaky bucket policing mechanism in ATM networks, IEEE J. Sel. Areas Commun. 9 (1991), no. 3, 335-342   DOI   ScienceOn
2 J. Zeng and L. F. Merakos, Analysis of a priority leaky bucket regulator for virtual path traffic in ATM networks, Proceedings of IEEE Globecom'94. 1994, 606-611
3 M. Sidi, Z. Lin, I. Cidon, and I. Gopal, Congestion control through input rate regulation, Proceedings of IEEE Globecom'89 ( 1989)
4 K. Sohraby and M. Sidi, On the performance of bursty and modulated sources subject to leaky bucket rate based access control schemes, IEEE Trans. on Commun. 42 (1994), 477-487   DOI   ScienceOn
5 H. Ahmadi, R. Guerin, and K. Sohraby, Analysis of leaky bucket access control mechanism with batch arrival process, IEEE Globecom'90 (1990), 344-349
6 B. D. Choi and D. I. Choi, Discrete-time analysis of the leaky bucket scheme with threshold-based token generation intervals, IEE Proc. Commun. 143 (1996), 105-111
7 B. D. Choi and D. I. Choi, The discrete-time analysis of the leaky bucket scheme with dynamic leacky rate control, Comm. Korean. Math. Soc. 13 (1998), no. 3, 603-627
8 J. Y. Lee and C. K. Un, Performance of dynamic rate leaky bucket algorithm, IEE Electron. Lett. 29 (1993), no. 17, 1560-1561   DOI   ScienceOn
9 D. I. Choi, B. D. Choi, and D. K. Sung, Performance analysis of priority leaky bucket scheme with queue-length-threshold scheduling policy, IEE Proc. Commun. 145 (1998), no. 6, 395-401
10 Y. H. Kim, B. C. Shin, and C. K. Un, Performance analysis of leaky bucket band-width enforcement strategy for bursty traffics in an ATM networks, Computer Networks ISDN Syst. 25(1992), 295-303   DOI   ScienceOn
11 C. G. Park, B. D. Choi, and D. K. Sung, Performance analysis of leaky bucket scheme with a threshold in the data buffer, Computer Networks ISDN Syst. 29 (1997), 781-795   DOI   ScienceOn
12 J. Tunner, New directions in communications(or Which way to the information age), IEEE Communi. Mag. 24 (1986), 17-24
13 G. L. Wu and J. W. Mark, Discrete time analysis of leaky bucket congestion control, Computer Networks ISDN Syst. 26 (1993), 79-94   DOI   ScienceOn