Browse > Article
http://dx.doi.org/10.12941/jksiam.2013.17.103

QUEUEING ANALYSIS FOR TRAFFIC CONTROL WITH COMBINED CONTROL OF DYNAMIC MMPP ARRIVALS AND TOKEN RATES  

Choi, Doo Il (Department of Applied Mathematics, Halla University)
Publication Information
Journal of the Korean Society for Industrial and Applied Mathematics / v.17, no.2, 2013 , pp. 103-113 More about this Journal
Abstract
We analyze the queueing model for leaky bucket (LB) scheme with dynamic arrivals and token rates. In other words, in our LB scheme the arrivals and token rates are changed according to the buffer occupancy. In telecommunication networks, the LB scheme has been used as a policing function to prevent congestion. By considering bursty and correlated properties of input traffic, the arrivals are assumed to follow a Markov-modulated Poisson process (MMPP). We derive the distribution of system state, and obtain the loss probability and the mean waiting time. The analysis is done by using the embedded Markov chain and supplementary variable method. We also present some numerical examples to show the effect of our proposed model.
Keywords
queueing analysis; leaky bucket; dynamic arrivals and token rates; MMPPs; thresholds; telecommunication networks;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 J. Tunner, New Directions in Communications(or Which Way to the Information Age), IEEE Communications Magazine, 24 (1986), 17-24.
2 M. Sidi, Z. Lin, I. Cidon, I. Gopal, Congestion Control through Input Rate Regulation, Proceedings of IEEE Globecom'89 1989.
3 Y. H. Kim, B. C. Shin, C. K. Un, Performance Analysis of Leaky Bucket Band-width Enforcement Strategy for Bursty Traffics in an ATM Networks, Computer Networks and ISDN System 25 (1992) 295-303.   DOI   ScienceOn
4 H. Ahmadi, R. Guerin, K. Sohraby, Analysis of Leaky Bucket Access Control Mechanism with Batch Arrival Process, IEEE Globecom'90 (1990) 344-349.
5 K. Sohraby, M. Sidi, On the Performance of Bursty and Modulated Sources subject to Leaky Bucket Rate based Access Control Schemes, IEEE Transactions on Communications 42 (1994) 477-487.   DOI   ScienceOn
6 G. L. Wu, J. W. Mark, Discrete Time Analysis of Leaky Bucket Congestion Control, Computer Networks and ISDN System 26 (1993) 79-94.   DOI   ScienceOn
7 J. Y. Lee, C. K. Un, Performance of Dynamic Rate Leaky Bucket Algorithm, IEE Electronics Letters 29 (17) (1993) 1560-1561.   DOI   ScienceOn
8 C. G. Park, B. D. Choi, D. K. Sung, Performance Analysis of Leaky Bucket Scheme with a Threshold in the Data Buffer, Computer Networks and ISDN System 29 (1997) 781-795.   DOI   ScienceOn
9 B. D. Choi, D. I. Choi, Discrete-time Analysis of the Leaky Bucket Scheme with Threshold-based Token Generation Intervals, IEE Proceedings of Communications 143 (1996) 105-111.
10 J. Zeng, L. F. Merakos, Analysis of a Priority Leaky Bucket Regulator for Virtual Path Traffic in ATM Networks, Proceedings of IEEE Globecom'94 (1994) 606-611.
11 D. I. Choi, B. D. Choi, D. K. Sung, Performance Analysis of Priority Leaky Bucket Scheme with Queue-lengththreshold Scheduling Policy, IEE Proceedings of Communications 145(6) (1998) 395-401.
12 D. I. Choi, S. Lee, Performance analysis of the leaky bucket scheme with queue length dependent arrival rates, Bulletin of the Korean Mathematical Society 43(3) (2006) 657-669.   DOI   ScienceOn
13 D. I. Choi, T. S. Kim, S. Lee, Analysis of an MMPP/G/1/K queue with queue length dependent arrival rates, and its application to preventive congestion control in telecommunication networks, European J. of Operational Research 187 (2008) 652-659.   DOI   ScienceOn