Browse > Article

Worst Average Queueing Delay of Multiple Leaky-Bucket-Regulated Streams and Jumping-Window Regulated Stream  

Lee, Daniel C. (Department of Electrical Engineering, University of Southern California)
Publication Information
Abstract
This paper presents deterministic, worst-case analysis of a queueing system whose multiple homogeneous input streams are regulated by the associated leaky buckets and the queueing system that has a single stream regulated by the jumping-window. Queueing delay averaged over all items is used for performance measure, and the worst-case input traffic and the worst-case performance are identified for both queueing systems. For the former queueing system, the analysis explores different phase relations among leaky-bucket token generations. This paper observes how the phase differences among the leaky buckets affect the worst-case queueing performance. Then, this paper relates the worst-case performance of the former queueing system with that of the latter (the single stream case, as in the aggregate streams from many users, whose item arrivals are regulated by one jumping-window). It is shown that the worst-case performance of the latter is identical to that of the former in which all leaky buckets have the same phase and have particular leaky bucket parameters.
Keywords
Leaky bucket; jumping window; queueing;
Citations & Related Records

Times Cited By Web Of Science : 6  (Related Records In Web of Science)
연도 인용수 순위
  • Reference
1 J. S. Turner, 'New directions in communications (or which way to the information age?),' IEEE Commun. Mag., Oct. 1986
2 S. Blake et al., An architecture for differentiated services. Internet Society, Dec. 1998. RFC 2475
3 A. W. Berger and W. Whitt, 'The brownian approximation for rate-control throttles and the G/G/1/C queue,' Discrete Event Dynamic Systems: Theory and Applications, pp. 7-60, 1992   DOI
4 A. W. Berger and W. Whitt, 'The pros and cons of a job buffer in a tokenbank rate-control throttle,' IEEE Trans. Commun., vol. 42, pp. 857-861, Feb./Mar./Apr. 1994   DOI   ScienceOn
5 M. G. Hluchyj and N. Yin, 'A second-order leaky bucket algorithm to guarantee QoS in ATM networks,' in Proc.IEEE GLOBECOM'96, 1996, pp. 1090-1096
6 D. S. Holtsinger and H. G. Perros, 'Performance of the buffered leaky bucket policing mechanism,' in Proc. TriCom'92: High-Speed Communication Networks, 1992, pp. 47-69
7 J. F. Kurose, ,' in Proc. ACM SIGMETRICS/IFIP Performance'92 Conf., (Newport, RI), June 1992, pp. 128-139
8 S.-K. Kweon and K. G. Shin, 'Traffic-controlled rate monotonic priority scheduling of ATM cells,' in Proc. IEEE INFOCOM'96, (San Francisco, CA), Mar. 1996, pp. 655-662
9 M. K. Wong and P. P. Varaiya, 'A deterministic fluid model for cell loss in ATM networks,' in Proc. IEEE INFOCOM'93, 1993, pp. 395-400
10 K. Shimokoshi, 'Resource management for multimedia broadband access networks,' in Proc. GLOBECOM'95, 1995, pp. 728-733
11 B. T. Doshi, 'Deterministic rule based traffic descriptors for broadband ISDN: Worst case behavior and connection acceptance control,' in The Fundamental Role of Teletraffic in the Evolution of Telecommunication Networks (J. Labetoulle and J. W. Roberts, eds.), Amsterdam: Elsevier Science, 1994, pp. 591-600
12 A. Skliros, 'Characterizing the worst traffic profile passing through an ATM-UNI,' in First UK Workshop on Performance Modeling and Evaluation of ATM Networks, IFIP, 1993, pp. 74-84
13 A. Parekh and R. Gallager, 'A generalized processor sharing approach to flow control in integrated service networks: The single-node case,' IEEE/ACM Trans. Networking, vol. 1, pp. 344-357, June 1993   DOI   ScienceOn
14 J. S. M. Ho, H. Uzunalioglu, and I. Akyildiz, 'Cooperating leaky bucket for average rate enforcement of vbr video traffic in ATM networks,' in Proc. IEEE INFOCOM'95, 1995, pp. 1248-1255
15 M. Bonatti and A. A. Gaivoronski, 'Worst case analysis of ATM sources with application to access engineering of broadband multiservice networks,' in The Fundamental Role of Teletraffic in the Evolution of Telecommunication Networks (J. Labetoulle and J. W. Roberts, eds.), pp. 559-569, Amsterdam: Elsevier Science, 1994
16 M. Reisslein, K. Ross, and S. Rajagopal, 'Guaranteeing statistical qos to regulated traffic: The single node case,' in Proc. IEEE INFOCOM'99, (New York), Mar. 1999, pp. 1061-1072
17 F. Lo Presti et al., 'Source time scale and optimal buffer/bandwidth tradeoff for heterogeneous regulated traffic in a network node,' IEEE/ACM Trans. Networking, vol. 7, pp. 490-501, Aug. 1999   DOI   ScienceOn
18 K. Sohraby et aI., IEEE J. Select. Areas Commun., vol. 9, Sept. 1991
19 R. Boorstyn et al., ,' in Proc. IEEE INFOCOM 2000, 2000, pp. 1223-1232
20 H. Ahmadi, R. Guerin, and K. Sohraby, 'Analysis of leaky bucket access control mechanism with batch arrival process,' in Proc. GLOBECOM'90, dec.1990,pp.344-349
21 J. A. S. Monteiro, M. Gerla, and L. Fratta, 'Leaky bucket analysis for ATM networks,' in Proc. SBT/IEEE Int. Telecommun. Symp., 1990, pp. 498-502
22 R. L. Cruz, 'Calculus for network delay - part I: Network elements in isolation,' IEEE Trans. Infom. Theory, vol. 37, pp. 114-131, Jan. 1991   DOI   ScienceOn
23 F. M. Guillemin et al., 'Extremal traffic and bounds for the mean delay of multiplexed traffic streams,' in Proc. IEEE INFOCOM 2002, 2002
24 A. Atkinson, 'A traffic control scheme for virtual paths in an asynchronous transfer mode network,' in Proc. GLOBECOM'94, 1994, pp. 1768-1773
25 J. M. Barcelo, J. Garcia Vidal, and O. Casals, 'Worst case traffic in a tree network of ATM multiplexers,' IEEE/ACM Trans. Networking, vol. 8, pp. 507-516, Aug. 2000   DOI   ScienceOn
26 R. L. Cruz, 'Calculus for network delay - part II: Network analysis,' IEEE Trans. Inform. Theory, vol. 37, pp. 132-141, Jan. 1991   DOI   ScienceOn
27 S. Low and P. P. Varaiya, 'Burst reducing servers in ATM networks,' , vol. 20, pp. 61-84, Sept. 1995   DOI   ScienceOn
28 R. G. Gallager et al., IEEE J. Select. Areas Commun., vol. 13, Aug. 1995
29 B. Erimli, J. Murphy, and J. Murphy, 'On worst case traffic in ATM networks,' in Twelfth UK lEE Teletraffic Symp., (Windsor, United Kingdom), Mar. 1995
30 A. Parekh and R. Gallager, 'A generalized processor sharing approach to flow control in integrated service networks: The multiple node case,' IEEE/ACM Trans. Networking, vol. 2, pp. 137-150, Apr. 1994   DOI   ScienceOn
31 D. C. Lee, 'Effects of leaky bucket parameters on the average queueing delay: Worst case analysis,' in Proc. IEEE INFOCOM'94, 1994, pp. 482-489
32 K. C. Budka, 'Stochastic monotonicity and convexity properties of ratebased flow control mechanisms,' IEEE Trans. Automatic Control, vol. 39, pp. 544-548, Mar. 1994   DOI   ScienceOn
33 E. P. Rathgeb, 'Modeling and performance comparison of policing mechanisms for ATM networks,' IEEE J. Select. Areas Commun., vol. 9, pp. 325-334, Apr. 1991   DOI   ScienceOn
34 T. Tsuchya and H. Saito, 'The worst case cell arrival patterns in ATM networks,' IEICE Trans. Commun., vol. 81-B, pp. 996-1003, May 1998
35 P. Castelli, A. Forcina, and A. Tonietti, 'Dimensioning criteria for policing functions in ATM netwokrs,' in Proc. IEEE INFOCOM'92, 1992
36 C.P. Su and G. de Veclana, 'On the overflow probability of deterministically constrained traffic,' in Proc. ICC'97, (Montreal), 1997, pp. 1704-1708
37 D. C. Lee, 'Worst case fraction of CBR teletraffic unpunctual due to statistical multiplexing,' IEEE/ACM Trans. Networking, vol. 4, pp. 98-105, Feb. 1996   DOI   ScienceOn
38 S. Shioda and H. Saito, 'Satisfying QOS standard with combined strategy for CAC and UPC,' in Proc. ICC'95, (Seattle), 1995, pp. 965-969
39 T. Worster, 'Modelling deterministic queues: The leaky bucket as an arrival process,' in The Fundamental Role of Teletraffic in the Evolution of Telecommunication Networks (J. Labetoulle and J. W. Roberts, eds.), Amsterdam: Elsevier Science, 1994, pp. 581-590
40 R. Krishnan and J. A. Silvester, 'The effect of variance reduction on the performance of the leaky bucket,' in Proc. ICC'95, (Seattle), 1995, pp. 1974-1980
41 I. Khan and V.O. K. Li, 'A traffic control mechanism for ATM networks,' in Proc. IEEE GLOBECOM'93, (Houston, TX), 1993, pp. 1122-1126
42 A. I. Elwalid and D. Mitra, 'Traffic shaping at a network node: Theory, optimum design, admission control,' in Proc. IEEE INFOCOM'97, 1997, pp. 444-454
43 N. Yamanaka, Y. Sato, and K. Sato, 'Performance limitation of leaky bucket algorithm for usage parameter control and bandwidth allocation methods,' IEICE Trans. Commun., vol. E75-B, pp. 82-86, Feb. 1992
44 D. Bertsekas and R. Gallager, Data Networks. Englewood Cliffs, NJ: Prentice-Hall, 2nd ed., 1992
45 G. de Veciana, 'Leaky buckets and optimal self-tuning rate control,' in Proc. GLOBECOM'94, 1994, pp. 1207-1211